Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (4)
Starting Price
  • (15)
  • (1)
  • (3)
  • (1)
  • (7)
Features
  • (67)
  • (66)
  • (65)
  • (64)
  • (64)
  • (56)
  • (52)
  • (51)
  • (43)
  • (38)
  • (31)
SW Score
  • (1)
  • (3)
  • (13)
  • (26)
  • (21)
Deployment
  • (10)
  • (6)
  • (77)
  • (21)
  • (18)
Customer Types
  • (6)
  • (5)
  • (75)
  • (76)
  • (72)
Pricing Model
  • (27)
  • (23)
  • (1)
  • (6)
  • (35)
  • (62)
Integrated With
  • (7)
  • (5)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 81 - 77 of 77 Products

Pricing Insights for Identity and Access Management (IAM) Software

  • The Average Cost of a basic Identity and Access Management (IAM) Software plan is $6 per month.

  • 36% of Identity and Access Management (IAM) Software offer a Free Trial Allows users to try out the software for a limited period before making a purchase decision. , while 31% offer a Freemium Model Allows users to access basic features at no cost..

List of Identity and Access Management (IAM) Software

PRODUCT NAME SW SCORE AGGREGATED RATINGS

Overview

Identity and Access Management (IAM) refers to a process that an organisation follows to identify, authenticate and authorise groups of people or individuals to gain access to systems, networks and applications, along with implied rights and restrictions with established identities. These include software processes which require access to organisational systems. It authenticates users and even dictates whether they can access particular applications and systems or not and to what level can they access it. It mainly focuses on the security and productivity of an organisation.

Identity and Access management software presents a strategy for the security system of a business organisation. They levy a high degree of control and enables the implementation of logging and accounting capabilities. These platforms can be applied universally and can include applications and devices which do not need any manual supervision. What makes this software very handy and efficient is that they can be operated on various devices. IAM software is extremely reliable, enable cost control and are incredibly scalable. However, there are certain things which should be kept in mind while selecting the apt software for your business enterprise.

  • Assure Compatibility: The Identity and access software that you choose for your organisation should have complete compliance with your business security systems, directory services, management consoles and other essentials. 
  • Scale from Pilot deployments: Before proceeding towards full-production deployment, it is highly essential to understand how this platform operates in an IT environment. Also, make sure the goals of your security policies remain unaltered by conducting ongoing security audits.
  • Verify internal support services: The tools, policies and procedures to be implemented should be well explained to the help desk and other support staff, including a proper training regarding social engineering and related attacks to ensure effective utilisation of the software’s products.

Features

Typical Features

API Access Management

Ensures that calls with authenticated access can enter APIs

Passwordless Login

Allows to login without password using other means of verification, e.g. SSH keys

Social Sign On

Allows users to sign on using credentials of social networking services

Single Sign-On (SSO)

Permits one set of login credentials to access multiple applications

User Activity Monitoring

Monitors and records user activities in the enterprise

Role Management

Helps regulate access to systems, based on individual roles

Multi-factor Authentication

Uses more than one method to verify a user's identity for a login

Password Management

Enables the administrator to manage, authenticate and reset passwords

Account Management

Helps to manage user accounts within organisations

Access Request Management

Helps to view and manage access requests submitted by the personnel

Compliance Management

Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed