Identity Management Solutions

Best Identity Management Solutions include:

The Okta Identity Cloud, LastPass for Business, Microsoft Azure Active Directory, and OneLogin.

Identity Management Solutions TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Solutions Overview

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

Challenges from Distributed Identity-Based Systems

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

Identity Centralization and Privileged Access Management

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Identity management solutions also enable businesses to utilize more granular privileged access management (PAM). Privileged access management ties users’ identities to specific privileges within different systems and applications. PAM capabilities limit the number of unnecessary access privileges that users have, minimizing the risk that comes with such excess privileges. Identity management software with PAM features, or standalone PAM products, also streamlining privilege management for IT administrators, improving efficiency and security simultaneously.

Identity Management Solution Comparisons

There are some common factors to consider when comparing identity management solutions:
  1. Identity management suite vs. password management solution: Many identity management solutions started out as password management tools which then expanded into identity management. These products will likely excel at ease of use and integrations with popular 3rd party systems. In contrast, identity management suites with a legacy of identity management will likely be more robust for complex or large-scale identity management needs.

  2. User-focus vs. data security focus: same goals, but user-focus is more focused on making end-user’s identity management processes easier. In contrast, data security is more aligned with privileged access management, which prioritizes minimizing the attack surface of a business’s systems and data.

  3. SMB vs. Enterprise Users: Many identity management products skew towards either the SMB or the Enterprise markets. SMB-focused products will likely be easier to use with a greater focus on efficiency and self-service, while enterprise products will be more scalable and robust for IT administrators. Buyers can consider the distribution of reviews across SMB and enterprise reviews as a signpost of where a product may lie on this spectrum.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

(1-25 of 131) Sorted by Most Reviews

The Okta Identity Cloud
132 ratings
79 reviews
Top Rated
Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become mo…
LastPass for Business
101 ratings
76 reviews
Top Rated
LastPass, a LogMeIn company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.
WatchGuard AuthPoint
34 ratings
43 reviews
Top Rated
WatchGuard AuthPoint is a multi-factor authentication (MFA) service that helps companies keep their assets, information, and user identities secure. Multi-factor authentication solutions can enable organizations to close security gaps that leave companies vulnerable to breaches by adding a layer of …
Idaptive Next-Gen Access
26 ratings
42 reviews
Idaptive Next-Gen Access Services, which was acquired by CyberArk in 2020, secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised cre…
1Password
51 ratings
38 reviews
Top Rated
AgileBits in Toronto offers 1Password, a password manager available to both private individuals and businesses, touting a unique approach to multi-factor authentication to improve security.
Microsoft Azure Active Directory
120 ratings
20 reviews
Top Rated
Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration with…
RSA SecurID Suite
30 ratings
17 reviews
The RSA SecurID Suite is an identity management, authentication and user provisioning offering supported by EMC's security division, RSA. The SecurID Suite includes SecurID Access 2FA and multi-factor authentication solutions and RSA Identity Governance & Lifecycle products.
OneLogin
28 ratings
16 reviews
Top Rated
OneLogin is the eponymous identity and access management (IAM) product from the company in San Francisco featuring single sign-on (SSO), multi-factor authentication, provisioning, cloud directory, and more.
SAP Customer Data Cloud (formerly Gigya)
5 ratings
9 reviews
The SAP Customer Data Cloud, based on Gigya (acquired by SAP in 2017) is a product suite that allows users to identify consumers, business customers, or partners across devices and channels to drive registrations and engagement; manage access, permission, and consent; and transform data into unified…
CyberArk Privileged Account Security
29 ratings
8 reviews
CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical a…
Varonis Data Security Platform
7 ratings
7 reviews
Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.
Kaseya AuthAnvil
8 ratings
6 reviews
Kaseya AuthAnvil is an identity and access management (IAM) platform providing two-factor authentication, single sign-on (SSO) and password management.
IBM Cloud App ID
26 ratings
6 reviews
IBM Cloud App ID helps developers who are not security experts to easily add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud user rep…
SolarWinds Access Rights Manager (ARM)
11 ratings
6 reviews
SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has access to what an…
IdentityIQ
6 ratings
6 reviews
SailPoint's IdentityIQ provides enterprise-level cloud-based or installed identity and access management (IAM) software featuring single sign-on (SSO), password management, provisioning, role management, and identity intelligence for audit purposes.
Amazon Cognito
14 ratings
6 reviews
Amazon Cognito is a mobile identity product that allows users to add user sign-up and sign-in to mobile and web apps, and authenticate users through social identity providers.
Oracle Identity Governance
42 ratings
5 reviews
Oracle Identity Governance (OIG) -formerly Oracle Identity Manager or OIM- is an enterprise identity management system that automatically manages users' access privileges within enterprise IT resources.
Ping Identity Platform
4 ratings
5 reviews
The Next-Gen Identity Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning, and more. Ping Id…
Auth0
3 ratings
5 reviews
Auth0 is an identity management platform for developers and application teams. It gives users a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 aims to provide the simplicity, extensibility, and expertise to scale and protect any application…
Forefront Identity Manager (Discontinued)
9 ratings
4 reviews
Forefront Identity Manager is a Microsoft's legacy identity management solution. In 2016 Microsoft released Microsoft Identity Manager, an updated IAM solution. Support for Forefront Identity Manager ended October 2017.
ManageEngine ADManager Plus
13 ratings
4 reviews
ManageEngine ADManager Plus simplifies enterprise-wide Windows Active Directory management and reporting.
BeyondTrust Endpoint Privilege Management
11 ratings
4 reviews
BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto reduces the risk of privilege abuse by eliminating unnecessary privileges, and can elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.
Oracle Identity Management
22 ratings
3 reviews
Oracle Identity Management is a suite of applications for IAM, now in edition 12c, which includes Oracle Identity Governance, Oracle Access Management, as well as Oracle's Directory Services.
IBM Security Verify Access, formerly IBM Security Access Manager (ISAM)
4 ratings
3 reviews
IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, aims to help simplify user access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker.
OpenText Identity and Access Management (IAM) Platform, formerly Covisint
0 ratings
2 reviews
Covisint is a cloud-based Identity Management (IdM) solution for enterprises, offering internal (B2E), B2B, and Partner (B2P) access solutions with directory, auditing and regulatory capabilities, provisioning, mobile accessibility and identity, and more, presenting a comprehensive and configurable …

Frequently Asked Questions

How does identity management software work?

Identity management software tracks users’ credentials and accounts in a central repository, enabling more centralization and security.

What’s the difference between identity management and privileged access management?

Identity management enables privileged access management by providing the system of record for user’s credentials and information. PAM then uses those credentials to assign specific privileges.

Does my business need identity management software?

A business should consider investing in identity management software if it leverages more than 1 or 2 protected systems with proprietary, sensitive, or business-critical data.

What are the benefits of an identity management system?

Identity management systems allow IT administrators to work more efficiently, saving time and money. They also improve business security, mitigating risks and potential breaches.

How much does identity management software cost?

Identity management software is most commonly priced per month, per user, up to $35/user/month for large deployments. Some vendors also offer specific features, like API access management or MFA, a la carte.