Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (5)
Starting Price
  • (15)
  • (1)
  • (3)
  • (1)
  • (9)
Features
  • (75)
  • (73)
  • (72)
  • (72)
  • (69)
  • (62)
  • (58)
  • (56)
  • (51)
  • (42)
  • (32)
SW Score
  • (2)
  • (2)
  • (19)
  • (29)
  • (20)
Deployment
  • (13)
  • (6)
  • (87)
  • (22)
  • (19)
Customer Types
  • (8)
  • (6)
  • (85)
  • (86)
  • (81)
Pricing Model
  • (34)
  • (26)
  • (2)
  • (6)
  • (40)
  • (69)
Integrated With
  • (10)
  • (6)
  • (6)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 20 of 87 Products

Top 5 ManageEngine Identity360 Alternatives

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Silverfort logo
Allow secure access and authentication process across business networks and cloud environments 4.9 Based on 17 Ratings
Visit Website + Add to Compare

What is Silverfort and how does it work?

Silverfort is an agentless multi-factor authentication platform that helps organizations deploy secure authentication and access, across their cloud environments and in-house networks in a non-intrusive and holistic way. The platform is designed to facilitate system MFA alongside interfaces that no other softwares could protect till date. It also includes legacy and homegrown applications, databases, file systems, critical infrastructure, along with admin access tools like PsExec that currently permit attackers to avoid agent-based MFA. Also, an integrated holistic authentication module within the particular offers unified access and authentication policies across multiple assets, users, and environments, both in the cloud and on-premises. Additionally, a robust AI-powered trust and risk engine, analyzes all machine and human access requests both on the perimeter and within the network in a continuous way. The software not only serves as a non-intrusive authentication platform, but also enhances the user experience and reduces disruptions by minimizing the MFA request numbers.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 91%
  • Reviews 71%
  • Momentum 62%
  • Popularity 64%

Silverfort Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Red Hat Identity Management logo
"Red Hat IdM centralizes Linux identity management" Write a Review
Visit Website + Add to Compare

What is Red Hat Identity Management and how does it work?

Red Hat Identity Management (IdM) is the perfect solution for businesses seeking a comprehensive and unified system to manage identity stores, authentication, policies, and authorization policies in their Linux-based domain. With IdM, can guarantee secure access to the customers applications with fast performance. As it is based on open source technology, administrators have full control over every aspect of security to ensure everything is adapted to their needs. IdM delivers low costs of ownership as easy installation and reliable performance take out the strain of managing systems’ configurations. Get ready for a framework that is designed to simplify tasks yet maintain robust security standards. Businesses wanting a complete solution for the identity management needs need not look further - Red Hat Identity Management is here! Red Hat Identity Management is a game-changer, empowering professionals like to take charge of identity management with confidence and ease. Say goodbye to fragmented systems and hello to a centralized, unified approach, all while adhering to the strictest of industry standards. Seize the opportunity today, and unlock the true potential of the Linux-based domain with Red Hat IdM.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 60%
  • Momentum 63%
  • Popularity 64%

Red Hat Identity Management Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Keycloak logo
An Open-source Identity And Access Management Tool For Modern Applications 4.5 Based on 44 Ratings
Visit Website + Add to Compare

What is Keycloak and how does it work?

Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 73%
  • Momentum 71%
  • Popularity 73%

Keycloak Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.
Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

One Identity logo
Eliminate potential risks out of and access management and enterprise identity 3.7 Based on 10 Ratings
Visit Website + Add to Compare

What is One Identity and how does it work?

One Identity is an advanced identity and access management tool that helps businesses to establish an identity-centric security strategy with Privileged Access Management (PAM) solutions. The tool helps to mitigate risk, secure data, satisfy compliance and meet uptime requirements by offering customers access to data and applications they need. With the Identity Manager, users can not only unify information security policies but can even fulfil governance needs in present times and into the future. One Identity comes with certified SAP integration offering advanced capabilities to enhance existing SAP security models and even improves them. Businesses can make better decisions by combining security information and policies from multiple sources to reduce risks. Further, One Identity provides auditors with detailed, real-time governance reports that include information about the available resources in the users’ environment and who has access to them. The tool also helps to achieve unified governance for all employees, regardless of their role and level of access.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 92%
  • Reviews 77%
  • Momentum 65%
  • Popularity 89%

One Identity Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

389 Directory Server logo
"389 Directory Server: Vital network asset" Write a Review
Visit Website + Add to Compare

What is 389 Directory Server and how does it work?

The 389 Directory Server is an essential resource for any professional network. Developed by the reliable Red Hat team, customer can be sure that the 389 Directory Server will support the customers business operations in a secure, flexible and highly scalable way. Designed specifically to provide robust Lightweight Directory Access Protocol (LDAP) services, it boasts unmatched performance and scalability, making it an ideal solution for larger organizations needing to store and manage even more data. The "389" name originates from the port number that it uses when handling LDAP requests, which makes for an easier integration into existing infrastructures. With its intuitive system administration console, customers are guaranteed a user-friendly operational experience. It's also open source software, meaning customizations are easily made, with extensive online documentation to guide the customer through any setup or configuration efforts needed. Let the 389 Directory Server to go-to the solution for LDAP server needs today!

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 60%
  • Momentum 67%
  • Popularity 66%

389 Directory Server Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.
Visit Website

Products Similar to ManageEngine Identity360

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

IBM Security Verify Access logo
Securely simplify user access 3.3 Based on 32 Ratings
Visit Website + Add to Compare

What is IBM Security Verify Access and how does it work?

IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, helps user simplify users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. Verify Access helps user strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with Verify Access.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 97%
  • Reviews 75%
  • Momentum 61%
  • Popularity 62%

IBM Security Verify Access Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SailPoint IdentityIQ logo
Identity And Access Management (IAM) Solution For An On-premise Deployment 4.6 Based on 17 Ratings
Visit Website + Add to Compare

What is SailPoint IdentityIQ and how does it work?

IdentityIQ lets you control every file and application across their hybrid IT environment by employees, partners, contractors, and even bots. It enables users to connect to 99% of applications and data, then uses a wizard setup and preconfigured workflows to onboard them in hours. The platform offers value-added features like Access Insights, Access Modeling, and Recommendations, providing greater intelligence and efficiency by keeping access policies up-to-date. These features let users know if access is safe or risky. Businesses can integrate governance controls with their mission-critical apps, such as AWS, SAP, and Salesforce, thus enabling their users to only access the information they require. SailPoint Predictive Identity provides AI-driven recommendations that help users determine when it’s safe to grant user access. Companies can also protect and govern access across millions of identities, billions of access points, and tens of thousands of applications and data sources. SailPoint IdentityIQ can also identify those users with risky access and track historical user access patterns.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 90%
  • Reviews 70%
  • Momentum 60%
  • Popularity 63%

SailPoint IdentityIQ Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Practice Protect logo
Simplest way for Accountants to secure 4.9 Based on 21 Ratings
Visit Website + Add to Compare

What is Practice Protect and how does it work?

Practice Protect is the accounting-specific cybersecurity platform that makes it quick & easy to secure and control client data, wherever your people work. Practice Protect tracks every access attempt to every application, so you have a complete log of who accessed what, from where. Practice Protect has Multi-Factor Authentication via a second code, sent directly to your phone or email address for ultimate security

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 76%
  • Momentum 62%
  • Popularity 81%

Practice Protect Pricing

  • Free Trial Not Available
  • Starts at $17.00. Offers Custom plan.
Visit Website

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SailPoint IdentityNow logo
SaaS Platform To Shape Identity 4.5 Based on 40 Ratings
Visit Website + Add to Compare

What is SailPoint IdentityNow and how does it work?

SailPoint IdentityNow is a SaaS platform that enables businesses to rethink and shape their identity in terms of security and risks. The tool tackles the challenges that come with digitizing and moving to the cloud by adopting new technologies. It also collaborates with patented AI capabilities and cloud governance to enhance and accelerate identity-related decisions such as identifying risk and analyzing security issues. SailPoint IdentityNow’s inbuilt AI helps businesses create and update roles to shape their identity program. It also provides real-time recommendations so that users can decide as to whether access should be granted or not. The tool analyses peer groups and identifies risky user access, thus quickly addressing security and compliance gaps. SailPoint IdentityNow minimizes helpdesk calls by offering users a comfortable and safe mode of changing or resetting the passwords. The tool enables users to use AI to discover and protect access to all their cloud platforms, including Azure, AWS, and Google Cloud Platform.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 88%
  • Reviews 81%
  • Momentum 61%
  • Popularity 62%

SailPoint IdentityNow Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

97% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

JumpCloud logo
Integrated cloud directory platform for businesses 4.7 Based on 2322 Ratings
Visit Website + Add to Compare

What is JumpCloud and how does it work?

JumpCloud is an intact cloud directory platform for organisations, enabling admins to control IT environments in the cloud, on-prem, remote and more. They can use a simple web interface to provision, manage and grant access to a wide variety of resources that are needed by employees on a day to day basis. Managers can import users from pre-existing platforms or create new users within JumpCloud, allowing them access to systems, applications, networks and other essential resources as well. Employers can use external apps like Zoom, Office365, GitHub, G Suite and Slack to get the work done. An App Identity Management feature within the particular lets enterprises generate and monitor accounts for their employees, specifying permissions and roles within those apps. From the employee front, JumpCloud lets business houses allow individual employees to make choices regarding their collaboration tools, helping them get the job done. The solution can serve as an authoritative directory for individual organisations.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 91%
  • Momentum 74%
  • Popularity 89%

JumpCloud Pricing

  • Free Trial Available
  • Starts at $9.0.
Visit Website

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Authentik logo
The Identity Provider with Unmatched Versatility Today Write a Review
Visit Website + Add to Compare

What is Authentik and how does it work?

Authentik is the most versatile Identity Provider available today. For professionals requiring the highest standard of digital security and looking to extend their existing environment with additional protocols, Authentik is the perfect choice. Authentik allows easily to authenticate users in customers application without the hassle of arduous user sign-up procedures or forgotten password resets. It also enables other authentication methods such as OpenID Connect and OAuth2 protocols, meaning that customer can enjoy support for any type of authentication method that wish to integrate into customers application. Authentik is open-source so that it can be further customized according to unique needs and specifications. Because of its flexibility, it's also incredibly easy to implement new protocols or refine existing ones within a short period of time. Better yet, Authentik represents good value for money as its pricing structure is highly competitive among providers offering similar services. Furthermore, its team of developers are experienced and knowledgeable in this field, meaning customer can rest assured knowing that data is safe with them. For those seeking an exceptional identity provider with expert support and impressive customizability options, look no further than Authentik – the ideal solution for reliable authentication processes.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 96%
  • Reviews 60%
  • Momentum 67%
  • Popularity 68%

Authentik Pricing

  • Free Trial Not Available
  • Starts at $5.0. Offers Free-forever and Custom plan.
Visit Website

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Lumos logo
Make Your Organization Secure, Compliant & Productive 4.9 Based on 51 Ratings
Visit Website + Add to Compare

What is Lumos and how does it work?

Lumos simplifies the access process for companies. It is an internal AppStore that helps to automate access requests, reviews and license management. This self-service platform helps to reduce the number of support tickets and makes access requests and approvals faster and more efficient. Lumos provides visibility into SaaS applications and spend, and also enables automated workflows for removing unused licenses. It is an ideal platform for companies looking to streamline their access process and reduce manual workload. Additionally, it helps to improve security and compliance as well as provides an overview of all applications used in the organization. Lumos provides an efficient and secure way for companies to manage their access requests and licenses.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 73%
  • Reviews 73%
  • Momentum 73%
  • Popularity 75%

Lumos Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ForgeRock Identity Platform logo
For All Your Identity Concerns 4.6 Based on 33 Ratings
Visit Website + Add to Compare

What is ForgeRock Identity Platform and how does it work?

ForgeRock Identity Platform is an AI-powered comprehensive identity management solution that offers full-suite IAM and IGA services. Enterprises get to monitor multiple risks, grow revenues, and enhance the productivity levels of their workforce using the wide variety of features offered by the software. With machine learning and artificial intelligence, the system helps corporate entitlement market be more visible, actionable, and predictable. It is an all-in-one solution for business houses, ensuring identity and security provisions, consistently across APIs, microservices, and applications. The software offers dynamic services, including scalability, open standards, and contextual security, allowing enterprises to meet IOT-level security demands. It serves as an identity gateway, enabling users to enforce security measures and bridge identity gaps across multiple business apps and APIs. With the inclusive directory service, enterprises can manage huge transactions and implement the latest privacy and security measures. The solution development kits offered by ForgeRock Identity Platform, enables developers embed identity within the mobile or web app they are working on, and receive device telemetry, facilitating enhanced decision making.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 89%
  • Reviews 81%
  • Momentum 61%
  • Popularity 62%

ForgeRock Identity Platform Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Zilla Security logo
Unified Identity and Access Security, Simplified and Automated 4.9 Based on 14 Ratings
Visit Website + Add to Compare

What is Zilla Security and how does it work?

Zilla Security stands out as the ultimate platform for unified identity and access security, compliance, and provisioning. Seamlessly integrating with over 1,000 applications and infrastructure components, it ensures comprehensive monitoring of identities and permissions. Its robotic automation enables rapid integration with any application, often within minutes. Zilla Security simplifies the user access review process by automating decisions, preparation, remediation, audit evidence, and reporting. This policy-driven approach ensures job-appropriate access while enhancing security and lowering costs. By automating identity and security operations, Zilla Security effectively addresses identity exposure and eliminates threats, offering a robust solution for modern enterprises.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 88%
  • Reviews 70%
  • Momentum 65%
  • Popularity 70%

Zilla Security Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Cognito logo
Step-up your identity verification services with Cognito 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Cognito and how does it work?

Cognito is an Identity and Access Management software that comes with an identity verification service and needs just a phone number to begin verifying your customers, which in turn assists you in streamlining your flow and cutting down troublesome inputs. It helps minimize manual review to the maximum while increasing match rate through highest quality regulated data on the market. It slowly gathers all required data from customers to verify them with the least information provided, without compromising on security and adhering to the strictest standards and best policies prevalent in the industry. It even automates compliance processes with the assistance of modern systems, helps verify age of customers if you happen to sell age-restricted goods and services and even enables real-time sanction screening while dealing with potential customers. It makes sharing links and creating new verification links possible, without writing codes, through its powerful and intuitive dashboard. Last, but not the least, the data that Cognito software provides is primary and hundred percent up-to-date.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 66%
  • Momentum 60%
  • Popularity 76%

Cognito Pricing

  • Free Trial Available
  • Starts at $0.10.
Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Gluu logo
A Highly Secured Identity And Access Management Tool 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Gluu and how does it work?

Gluu provides Single Sign-on (SSO), Two-factor authentication (2FA), and access management service to different types of companies. The SSO feature offers secure sign-on across OpenID Connect, SAML, and CAS web & mobile applications. Users can choose from a variety of 2FA mechanisms and business logic to enforce strong security everywhere. Using access management, users will have the capability to manage who can access which resources across the digital kingdom. Gluu enables companies to bridge existing LDAP identity systems and Active Directory to give apps secure access to user data. The tool also helps in the fast deployment of code using Linux packages for Ubuntu, CentOS, RHEL, and Debian on any cloud platform. Using the in-built features, companies can also add, edit, and manage people, groups, and user attributes to ensure valid information is released to the right applications and services. It allows data movement between Gluu and existing identity management (IDM) tools by leveraging LDAP and SCIM APIs.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 100%
  • Reviews 70%
  • Momentum 69%
  • Popularity 81%

Gluu Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

RSA SecurID logo
Be secure and organised with this identity & access software 4.4 Based on 366 Ratings
Visit Website + Add to Compare

What is RSA SecurID and how does it work?

RSA SecurID is an identity and access management software that offers a seamless access experience to users by using two-factor authentication for protecting networks. Right from the ground to the cloud, this software uses identity insights, threat intelligence and business context for delivering a safe and secure access to all your users across all your applications and gadgets. It provides a one-powerful suite-of-solutions through a range of features which include multi-factor authentication, identity governance, risk based access management and user lifecycle management, all in one loop. In this era of growing cyber crimes, RSA SecurID provides an analytically-driven insight to prioritize identity risks and protects assets accordingly through successfully designed Identity and access management programs which monitor complete control over who gets access to what. Undoubtedly, it offers a complete solution for security and control to keep ahead of growing threats.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 98%
  • Reviews 88%
  • Momentum 64%
  • Popularity 66%

RSA SecurID Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Oracle Identity Management logo
A tool to handle the identity management of your company 3.8 Based on 99 Ratings
Visit Website + Add to Compare

What is Oracle Identity Management and how does it work?

Oracle Identity Management effectively manages user identities in organisations across all enterprise resources. It is a platform that provides scalable solutions for identity governance, access management and directory services. It aids in strengthening security, simplifying compliance and capturing business opportunities through multiple accesses including mobile and social. The latest addition to this software is the Oracle Identity Cloud Service, a highly innovative, fully integrated service that uses a multi-tenant cloud platform to deliver all the core identity and access management capabilities. Oracle Identity management is a highly reliable solution for authentication and authorization for operating systems, applications and database usage in huge business enterprises. With this platform, you can now provision, administer and manage passwords automatically, intertwined in a comprehensive workflow engine. This helps reduce IT administration costs and even improves security. This software also provides attestation support which means users can confirm access rights to people on a periodic basis.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 97%
  • Reviews 80%
  • Momentum 63%
  • Popularity 63%

Oracle Identity Management Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

85% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Ping Intelligent Identity logo
The best identity management solution there is 4.5 Based on 222 Ratings
Visit Website + Add to Compare

What is Ping Intelligent Identity and how does it work?

Ping Intelligent Identity is a single solution for identity management and automated workflows across all the chosen identity platforms. The solutions set of the cloud platform helps enterprises to decide and finalise on the right set of requirements along with specific use cases. Here the client companies are allowed to learn about their requirements, solve use cases on a single platform and orchestrate growth with future-oriented solutions. PingOne for Customers is designed to deliver seamless communication from their end that includes passwordless logins, easy registrations and interactive newsletters to mention a few. PingOne for the workforce has been designed keeping in mind the needs of the working teams. One of their foremost requirements is the delivery of standardised and intelligent authentication for any user, device, application or identity storage in any scenario. Ping Intelligent Identity is thus, the best option for combining solutions and transforming the enterprise in concern.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 94%
  • Reviews 86%
  • Momentum 62%
  • Popularity 62%

Ping Intelligent Identity Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

GateKeeper Enterprise logo
The ultimate security for PCs 5 Based on 23 Ratings
Visit Website + Add to Compare

What is GateKeeper Enterprise and how does it work?

GateKeeper Enterprise is a proximity authentication software that provides users with automated access management solutions. It is a wireless, password-less, real-time token authentication, which offers extremely safe and secure login experience to users. One can opt for the auto-unlock feature to get smooth and instant access anytime. Users do not have to remember any password; they only need a wireless key. This proximity-based key enables one to eliminate all manual logins. The computer system of an individual will get unlocked once he/she approaches it and automatically gets locked once the person leaves. The software also offers touch unlock methods. It comes with a military-grade AES 256 encryption, which makes HIPAA, NIST, GDPR, CJIS easy to work on. With GateKeeper Enterprise, one can prevent disruptive data breaches successfully. The software also prevents and reduces the use of support tickets, which means users can set permissions based on their access control lists. They can run multiple computers with just a single key, prevent phishing attacks, and do more. Also, there can be multiple users per computer, each having their unique auto-unlock login methods. GateKeeper has a centralized management dashboard that displays lock and unlock reports over a specific period of time.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 91%
  • Reviews 79%
  • Momentum 62%
  • Popularity 62%

GateKeeper Enterprise Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed