Identity Governance and Administration Tools and Solutions

TrustRadius Top Rated for 2023

Top Rated Products

(1-3 of 3)

1
ManageEngine ADAudit Plus

ADAudit Plus offers real-time monitoring, user and entity behaviour analytics, and change audit reports that helps users keep AD and IT infrastructure secure and compliant.Track all changes to Windows AD objects including users, groups, computers, GPOs, and OUs.Achieve hybrid AD…

2
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

3
IBM Security Verify

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.

All Products

(1-25 of 60)

1
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

2
ManageEngine ADAudit Plus

ADAudit Plus offers real-time monitoring, user and entity behaviour analytics, and change audit reports that helps users keep AD and IT infrastructure secure and compliant.Track all changes to Windows AD objects including users, groups, computers, GPOs, and OUs.Achieve hybrid AD…

3
IBM Security Verify

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.

Explore recently added products

4
SecurID

SecurID, a company and solution suite from RSA, is an identity and access management suite supporting access management, authentication, and identity governance.

5
SAP Access Control

SAP Access control streamlines the process of managing and validating user access to applications and data with minimal support from IT, with the goal of giving employees the applications and services they need without exposing data and processes to unauthorized use.

6
SailPoint Identity Platform

SailPoint Identity Security for the cloud enterprise manages risk from the explosion of technology access. The solution gives businesses visibility while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services.

7
Teams Manager for Microsoft Teams

IT administrators can keep control of their Microsoft 365 environment with Teams Manager. Teams Manager is used to prevent the uncontrolled creation of Teams and Groups and automate governance processes. Key Features:• Governance Dashboard and Reports – provides an overview of the…

8
Oracle Cloud Infrastructure Identity Access Management (OCI IAM)

The Oracle Identity Cloud Service is a PaaS security and identity platform which provides hybrid identity features to maintain a single identity for each user across their on-premise and in the cloud services while delivering a seamless user experience.

9
Imprivata OneSign

OneSign from Imprivata, the global healthcare-oriented IT security company, is a single sign-on (SSO) and authentication management, dedicated to fast but secure audit-proof clinical data access. While generally a healthcare vertical specialist, Imprivata's offers OneSign as an…

10
ManageEngine ADManager Plus

ManageEngine ADManager Plus simplifies enterprise-wide Windows Active Directory management and reporting.

11
New User Approve by WPExperts

New User Approve by WPExperts automates a WordPress website’s user registration process. Receive user registration requests and send approval or rejection emails with customized messages. When a user sends a request to register on a WordPress site, the ‘New User Approval’ plugin…

12
Fischer Identity as a Service

Fischer Identity as a Service (IaaS) is an identity management solution from Fischer International.

13
Microsoft Entra ID Governance

Microsoft Entra ID Governance (formerly Azure AD Security Governance) is an IT security platform which will secure users, govern access with intelligent policies, continuously monitor threats, and take appropriate action.

14
Imprivata Cortext

Imprivata Cortext is a messaging security system that is HIPAA compliant and oriented towards the needs of those in the healthcare industry.

15
Cross Identity

Cross Identity (formerly Ilantus) is presented as a comprehensive Identity & Access Management Solution, with SSO, web access management, and related features such as shared app login (multiple employees can use a single license during different sessions, and yet protect the app…

16
Symantec IGA

Symantec IGA (formerly Layer7 Identity Suite & CA Identity Suite) from Broadcom provides comprehensive identity management and governance capabilities. In addition, Symantec IGA performs risk analysis and certification and enables remediation actions in real-time during the access…

17
Lightning Tools DeliverPoint

DeliverPoint supports reporting and managing SharePoint permissions. Site Owners, Site Collection Administrators, and SharePoint Administrators can run permission reports that reflect the permissions of every user. Site collections, Teams Channels, Hub Sites, SharePoint Sites, OneDrive,…

18
One Identity Identity Manager

One Identity, a division of Quest, offers an identity management, governance, and privileged access solution via Identity Manager, a tool to mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving users access to data and applications they need and nothing…

19
NetIQ by OpenText

NetIQ secures organizations through a comprehensive set of identity and access services for workforce and customer identities.

20
Pyla
0 reviews

Pyla automates IT Onboarding and IT Offboarding. It centralizes and automates the allocation of employee access and permissions in one platform, allowing optimal management of employee profiles. Key features : > Faster provisioning of IT resources and accurate management of…

21
Imprivata PatientSecure

Imprivata PatientSecure is a positive patient identification using biometric identification dedicated to protecting patient safety and privacy, and which also supports data integrity with error identification and remediation (e.g. removal of duplicates).

22
Roq.ad
0 reviews

Roq.ad offers GDPR compliant identity resolution and data onboarding.

23
Hitachi ID Bravura Identity

Hitachi ID Identity Manager is designed to manage user accounts, identity information and security entitlements on a variety of systems and applications. Identity Manager is presented by the vendor as an integrated solution for managing identities, groups and security entitlements…

24
Evidian Identity and Access Management as a Service
0 reviews

Evidian, an Atos company, offers an identity and access management (IAM) solution for access and authorization control.

25
Fischer Identity Suite

Fischer Identity is a cloud-based or on-premise identity management solution from Fischer International Identity headquartered in Naples, Florida, featuring access controls, password management, single sign-on (SSO), role and privilege management, and more, with a particular focus…

Learn More About Identity Governance and Administration Tools and Solutions

What are Identity Governance and Administration Tools and Solutions?

Identity governance and administration (IGA) tools promote cybersecurity and risk oversight, orchestrate identity management and access control, and help enforce IAM (Identity Access Management) policies. These tools support a zero trust security framework, providing access to explicitly defined resources (systems, networks, devices, applications, and data) for authenticated and authorized users.

Identity governance tools manage roles, monitor and log activity, create alerts for unauthorized access attempts, analyze risk, produce reports, and support compliance with consumer and data protection regulations. Identify administration tools focus on account and credential administration, entitlement management, user and resource provisioning.

IGA tools provide lifecycle management for employees, contractors, partners, IoT devices, and bots, adding new entities, updating access privileges based on changing roles, and terminating access upon severance.

AI and machine learning automate password management and provisioning. Users can request access to resources within the tools, bypassing the need for manual authorization. Based on a user’s previous activity these tools approve or deny permissions.

These tools are used by security administrators and compliance officers and support cloud, on-premises, and hybrid infrastructures.

Identity Governance and Administration Solutions Features

Identity governance and administration tools have many of the following features.

  • Orchestrate identity management, access control, user and resource provisioning
  • Role-based administration
  • Entitlement management
  • Lifecycle management
  • Automated workflows
  • Activity monitoring
  • Real-time risk detection
  • Unauthorized access reporting
  • Compliance reporting mapped to industry regulations
  • Analytics and risk reporting
  • Identity metrics
  • Artificial intelligence and machine learning for automated identity management and access authorization
  • Mobile apps
  • Support cloud, on-premises, and hybrid infrastructures

Identity Governance and Administration Tools Comparison

Consider the following when purchasing identity governance and administration solutions.

Complexity and Integrations: IGA tools are complex and should be reviewed to determine how well they align with your security policies, operations, and existing security infrastructure.

If your organization has any of the following tools installed; Identity Management Solutions, Password Manager Software, Privileged Access Management Solutions, Single Sign-On Solutions, or Zero Trust Security Solutions, evaluate how the addition of IGA tools will best complement and enhance your security infrastructure.

Use Case: Any business or organization will benefit from the enhanced and more efficient security IGA tools provide, especially ones that are subject to regulatory compliance. Some tools focus on specific industries such as health care with its extensive data protection and privacy requirements, and financial services that manage sensitive financial information.

Cloud-based Tools: IGA tools implemented using the cloud are available sooner and implemented more rapidly compared to on-premises tools. Organizations that have a robust IT infrastructure and wish to maintain complete control over their operational environments such as banking and financial service companies may find an on-premises solution to be more appropriate.

Pricing Information

Most identity governance and administration tools require obtaining a vendor quote for pricing. Pricing that is available ranges from $2 to $6 a month, per user.

Related Categories

Frequently Asked Questions

What are the benefits of using Identity Governance and Administration tools?

IGA tools save time, reduce costs, improve transparency, detect, and prevent unauthorized access, enhance security, mitigate risk, improve user experience, support regulatory compliance, and promote rapid onboarding of users and applications providing faster, more efficient, and secure access to business resources.

What do Identity Governance and Administration tools do?

Identity governance and administration tools include account administration and entitlement management for creating, authenticating, and authorizing secure identities for resource provisioning. These tools track activity, automate workflows, record unauthorized access, analyze risk, and facilitate regulatory compliance.

How much do Identity Governance and Administration tools cost?

Prices range from $2 to $6 a month, per user, however, most vendors do not list their prices and require obtaining a price quote.