Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (4)
Starting Price
  • (15)
  • (1)
  • (3)
  • (7)
Features
  • (67)
  • (66)
  • (64)
  • (63)
  • (63)
  • (56)
  • (52)
  • (51)
  • (43)
  • (37)
  • (31)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
SW Score
  • (1)
  • (4)
  • (13)
  • (26)
  • (21)
Deployment
  • (10)
  • (6)
  • (78)
  • (22)
  • (18)
Customer Types
  • (6)
  • (5)
  • (75)
  • (77)
  • (73)
Pricing Model
  • (26)
  • (22)
  • (1)
  • (6)
  • (34)
  • (63)
Integrated With
  • (8)
  • (5)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 61 - 17 of 78 Products

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Alibaba Resource Access Management logo
Management of Resource Access 4.4 Based on 5 Ratings
View Details + Add to Compare

What is Alibaba Resource Access Management and how does it work?

Alibaba Cloud Resource Access Management (RAM) is a user management and access control solution that allows you to centrally manage your users (including personnel, systems, and applications) and securely regulate their access to your resources via permission levels. As a result, RAM enables you to securely provide Alibaba Cloud resource access permissions to only your chosen high-privileged users, enterprise professionals, and partners. This ensures that your cloud resources are used safely and appropriately, as well as preventing unauthorized access to your account. RAM enables you to control access to Alibaba Cloud services and resources from a single location. RAM users and user groups can be created and managed using RAM. You can also give RAM individuals and user groups authorization to limit their access to cloud resources. You can manage different user identities and issue permissions for resource access with Alibaba Cloud Resource and Access Management (RAM). Alibaba Cloud RAM's major function is to assign and manage an access lifecycle for each product deployment for an organization by keeping digital identities. An overview of Alibaba Cloud Resource and Access Management (RAM) will be provided in this post.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 91%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

Alibaba Resource Access Management Pricing

  • Free Trial Not Available
  • Alibaba Resource Access Management Offers Free-forever plan.

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

SailPoint IdentityNow logo
SaaS Platform To Shape Identity 4.5 Based on 40 Ratings
View Details + Add to Compare

What is SailPoint IdentityNow and how does it work?

SailPoint IdentityNow is a SaaS platform that enables businesses to rethink and shape their identity in terms of security and risks. The tool tackles the challenges that come with digitizing and moving to the cloud by adopting new technologies. It also collaborates with patented AI capabilities and cloud governance to enhance and accelerate identity-related decisions such as identifying risk and analyzing security issues. SailPoint IdentityNow’s inbuilt AI helps businesses create and update roles to shape their identity program. It also provides real-time recommendations so that users can decide as to whether access should be granted or not. The tool analyses peer groups and identifies risky user access, thus quickly addressing security and compliance gaps. SailPoint IdentityNow minimizes helpdesk calls by offering users a comfortable and safe mode of changing or resetting the passwords. The tool enables users to use AI to discover and protect access to all their cloud platforms, including Azure, AWS, and Google Cloud Platform.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 87%
  • Reviews 71%
  • Momentum 61%
  • Popularity 62%

SailPoint IdentityNow Pricing

  • Free Trial Not Available

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
Account Security Solutions To Manage Identity Life Cycles 4.8 Based on 9 Ratings
View Details + Add to Compare

What is CyberArk Conjur and how does it work?

CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 80%
  • Reviews 68%
  • Momentum 62%
  • Popularity 69%

CyberArk Conjur Pricing

  • Free Trial Not Available

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Teleport Desktop Access logo
A single Access Plane for mixed environments Write a Review
View Details + Add to Compare

What is Teleport Desktop Access and how does it work?

Identity-based, passwordless access to Windows hosts across all cloud, on-premises, and edge environments. Upgrade your entire Windows fleet to security best practices, including SSO, MFA, and passwordless just-in-time access via short-lived certificates. Teleport provides a secure, passwordless login experience to Windows machines using your favorite hardware device.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 90%
  • Reviews 60%
  • Momentum 61%
  • Popularity 62%

Teleport Desktop Access Pricing

  • Free Trial Not Available
  • Teleport Desktop Access Offers Custom plan.

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

PeoplePlatform logo
A tool to automate and delegate identity management 4.9 Based on 19 Ratings
View Details + Add to Compare

What is PeoplePlatform and how does it work?

PeoplePlatform empowers an organization to handle the tasks associated with Identity Management through a simple web interface. You can control the access to your organization’s resources via single and bulk provisioning and deprovisioning. It can also handle workflows to automate jobs that can scheduled to run after a provisioning. Role based security lets you provide different access to the different sets of people. It supports multiple platforms and lets you simultanously provision objects into Active Directory, G Suite and Azure Active Directory. Admins can set the monitoring on so that there’s an approval process in place to accept changes. Other important features of PeoplePlatform include Custom Form Builder, Notification changes, Active Directory Reports, Business Rules Management etc. Now simplify the access management in your organization with a simple web interface powered by PeoplePlatform.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 60%
  • Momentum 61%
  • Popularity 60%

PeoplePlatform Pricing

  • Free Trial Available
  • PeoplePlatform Offers Custom plan.

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Instasafe Secure Access logo
A Secure Access Solution 4.9 Based on 27 Ratings
View Details + Add to Compare

What is Instasafe Secure Access and how does it work?

InstaSafe Secure Access software is a platform used to manage identity based on the principles of Software Defined Perimeter (SDP). The software offers tools to hide information of the application such as the DNS and IP address information. Manage granular access control to device identity before access to applications with instant alerts. Medium and Large companies make use of the software.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 92%
  • Reviews 60%
  • Momentum 61%
  • Popularity 61%

Instasafe Secure Access Pricing

  • Free Trial Not Available
  • Instasafe Secure Access Offers Custom plan.

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Passbase logo
Create a powerful and easy-to-use customer verification system easily 5 Based on 1 Ratings
View Details + Add to Compare

What is Passbase and how does it work?

Passbase is a KYC and ID verification solution that enables businesses with customer identity verification through selfies, documents and government databases. The solution helps users to authenticate more than 6000 government-issued identity documents from over 190 countries within seconds. It is also equipped with an advanced NIST face comparison technology that businesses can use to match photo IDs and prevent spoofing attacks in real-time. Passbase allows users to strengthen their verification program by checking through the global AML watchlist or additional documents required. The solution makes it easy for businesses to assemble and adjust their verification flow by helping the latter to design, maintain and deploy intuitive identity solutions in minutes. Moreover, powerful SDKs loaded within, help users to sync data in an instant via webhooks. Passbase includes a variety of popular tools that can be used to prototype individual ideas and launch an effective and efficient verification system within minutes.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 80%
  • Reviews 60%
  • Momentum 60%
  • Popularity 83%

Passbase Pricing

  • Free Trial Available
  • Starts at $99.0. Offers Free-forever plan.

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Authenteq logo
A Secure Platform for Identity verification Write a Review
View Details + Add to Compare

What is Authenteq and how does it work?

Authenteq software is an identity verification tool used to automate business process. The software uses AI tool to prevent identity theft and fraud for business. It can integrate into your website or app to optimize the experience with AI to automate the authentication process. Small and Medium companies make use of the software.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 81%
  • Reviews 60%
  • Momentum 62%
  • Popularity 76%

Authenteq Pricing

  • Free Trial Available

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Bare.ID logo
Highly Secure Single Sign On SaaS Write a Review
View Details + Add to Compare

What is Bare.ID and how does it work?

Bare.ID stands for user-friendly identity and access management in the cloud. With Bare.ID you can connect digital business processes and applications to a local user directory and benefit from centralized security and single sign-on.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 84%
  • Reviews 60%
  • Momentum 62%
  • Popularity 67%

Bare.ID Pricing

  • Free Trial Not Available
  • Bare.ID Offers Custom plan.

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

BlackBerry Enterprise Identity logo
Advance Your Mobile Strategy with Simple, Secure Identity Management 5 Based on 9 Ratings
View Details + Add to Compare

What is BlackBerry Enterprise Identity and how does it work?

BlackBerry Enterprise Identity delivers access control designed to provide the security of traditional user authentication. BlackBerry Enterprise Identity delivers a superior single sign-on user experience. Employees can use one password for all cloud services, across all mobile devices (iOS, Android and BlackBerry) and traditional computing platforms (Windows and macOS). This eliminates the frustration of multiple passwords and logins, and users will only confront stronger methods when they’re a necessary security measure.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 87%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

BlackBerry Enterprise Identity Pricing

  • Free Trial Available
  • BlackBerry Enterprise Identity Offers Custom plan.

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Lumos logo
Make Your Organization Secure, Compliant & Productive Write a Review
View Details + Add to Compare

What is Lumos and how does it work?

Lumos simplifies the access process for companies. It is an internal AppStore that helps to automate access requests, reviews and license management. This self-service platform helps to reduce the number of support tickets and makes access requests and approvals faster and more efficient. Lumos provides visibility into SaaS applications and spend, and also enables automated workflows for removing unused licenses. It is an ideal platform for companies looking to streamline their access process and reduce manual workload. Additionally, it helps to improve security and compliance as well as provides an overview of all applications used in the organization. Lumos provides an efficient and secure way for companies to manage their access requests and licenses.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 73%
  • Reviews 60%
  • Momentum 62%
  • Popularity 74%

Lumos Pricing

  • Free Trial Not Available
  • Lumos Offers Custom plan.

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Ezeelogin logo
Setup your On-prem SSH Jump Server Write a Review
View Details + Add to Compare

What is Ezeelogin and how does it work?

Creating a self-hosted jump server is an easy way to manage secure shell (SSH) access to Linux servers, routers, switches, and cloud instances. It can be used to control who has access to certain systems and centrally manage authentication and logging. The setup process is relatively straightforward and can be completed in a few steps. First, user will need to provision a machine to host the jump server. It should have an operating system supported by organization, sufficient RAM and disk space, and a public IP address. Next, user will need to configure the server. This includes setting up a firewall, installing the required software, and configuring the SSH server.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 72%
  • Reviews 60%
  • Momentum 60%
  • Popularity 75%

Ezeelogin Pricing

  • Free Trial Available
  • Starts at $1.99. Offers Custom plan.

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Login-Master logo
For those who expect more Write a Review
View Details + Add to Compare

What is Login-Master and how does it work?

Nothing works on the Internet today without login, access and identity management functionalities. This is often seen as a side issue. But it is all the more important to ensure the safety of customers and partners. Keycloak is now completely in line with the open source idea. Extensions to complete and secure the administration and maintenance of personal data.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 77%
  • Reviews 60%
  • Momentum 62%
  • Popularity 64%

Login-Master Pricing

  • Free Trial Not Available
  • Login-Master Offers Custom plan.

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Merit logo
Verified Digital Identity Write a Review
View Details + Add to Compare

What is Merit and how does it work?

Merit’s verified identity platform brings visibility, liquidity, and trust to people-data, giving organizations the clarity to make better-informed decisions, engage with individuals effectively, and pursue their mission efficiently. Merit works with trusted private, state, and municipal organizations to solve critical real-world problems in sectors such as workforce development, emergency services, licensing, education, and defense readiness.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 64%
  • Reviews 60%
  • Momentum 66%
  • Popularity 81%

Merit Pricing

  • Free Trial Not Available
  • Merit Offers Custom plan.

76% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

AgencyAccess logo
An Easy way to access clients Write a Review
View Details + Add to Compare

What is AgencyAccess and how does it work?

Introducing AgencyAccess, the answer to all their client account management woes. Say goodbye to the endless back-and-forth of password sharing and complicated setup procedures. With just one simple link, they can effortlessly connect to all their client's accounts, saving they valuable time and headaches. Not only does AgencyAccess make connecting to client accounts a breeze, but it also prioritizes the security and privacy of both their agency and their clients. Rest assured that their data is safe and meets GDPR compliance standards, giving they peace of mind as they work with sensitive information. But it doesn't stop there. AgencyAccess also allows they to create a unique and impressive onboarding process for their clients, showcasing their agency's expertise and commitment to excellence right from the start. Make a strong first impression and set yourself apart from the competition. Don't waste another minute on tedious account management tasks. Let AgencyAccess streamline their workflow and elevate their client relationships. Experience the power of seamless collaboration and efficient workflow management with AgencyAccess. Say hello to a new era of productivity and professionalism.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 81%
  • Reviews 60%
  • Momentum 60%
  • Popularity 60%

AgencyAccess Pricing

  • Free Trial Available
  • Starts at $23.00.

75% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Trend Micro ID Protection logo
Start protecting your identity today Write a Review
View Details + Add to Compare

What is Trend Micro ID Protection and how does it work?

Introducing Trend Micro ID Protection, the ultimate solution for safeguarding their online identity. Formerly known as Trend Micro Check, this powerful tool is their all-in-one adblocker, password manager, and privacy-enhancing browser extension. But what sets Trend Micro ID Protection apart from other privacy tools? First and foremost, it's this commitment to providing a comprehensive suite of features to ensure their online security. With just one download, they can say goodbye to invasive trackers, annoying ads, and the constant worry of navigating through dangerous websites. This extension not only blocks these threats, but also cleans and secures their browser, and even helps they manage their passwords. No more struggling to remember dozens of login credentials they've got they covered. But the protection doesn't end there. Through this extension, they gain access to the ID Protection portal and mobile app, where they'll find a host of additional features. This team tirelessly scours the internet and dark web for any mention of their personal information, so they can stay one step ahead of identity-related threats. Your private vault is where they can securely store their passwords and sensitive notes, all protected by their unique Trend Micro Account password and client key for added peace of mind. This informative and authoritative brand voice exudes confidence in this ability to keep they safe online. And we understand that this target audience, professionals with a third party perspective, demand nothing less. So why wait? Take control of their online privacy today with Trend Micro ID Protection. Download now and protect what matters most their identity.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 75%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

Trend Micro ID Protection Pricing

  • Free Trial Not Available
  • Trend Micro ID Protection Offers Free-forever and Custom plan.

74% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Trackteem logo
Time and attendance solution Write a Review
View Details + Add to Compare

What is Trackteem and how does it work?

Trackteem is designed to provide a time and attendance solution that offers a safer, cleaner alternative of Fingerprint scanners attendance system to stop the spread of germs amid the coronavirus pandemic. Trackteem provides you multiple options to authenticate your employees for their attendance which includes Face, Mobile phone Fingerprint, Voice, Typing Pattern, and QR Code. Trackteem lets you drill down to the present location of every single member of your field force along with pertinent information on their tasks and accomplishments.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 76%
  • Reviews 60%
  • Momentum 60%
  • Popularity 61%

Trackteem Pricing

  • Free Trial Available
  • Starts at $7.0. Offers Free-forever and Custom plan.

70% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

JustAuthenticateMe logo
Authenticate users without any hassle Write a Review
View Details + Add to Compare

What is JustAuthenticateMe and how does it work?

JustAuthenticateMe is a web app authentication service that uses simple magic links. This is a serverless plugin that uses JustAuthenticateMe to automatically authenticate your serverless endpoints. It checks incoming requests with the JustAuthenticateMe API Gateway Custom Authorizer and passes the user's email to your endpoint handler. You can speed up your app and make your users' lives easier with JustAuthenticateMe's simple email-based authentication. Passwords aren't required because they're pointless. Users despise them, and you don't want to deal with support tickets for forgotten passwords. Don't worry about maintaining your database and ours in sync if you trade your own user table. We don't even keep track of who has accessed your account. Web impact is up to ten times lower than the competition. Don't clog up your user interface by downloading javascript bundles you don't need. JustAuthenticateMe is a simple authentication-as-a-service solution for web applications. It employs magic links in emails to authenticate identification, removing the need for passwords for both you and your users.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 65%
  • Reviews 60%
  • Momentum 60%
  • Popularity 60%

JustAuthenticateMe Pricing

  • Free Trial Not Available
  • Starts at $10.0. Offers Free-forever plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed