Best Identity Management Solutions83Identity Management (IdM) is essentially about creating, maintaining, and retiring individual enterprise accounts for IT security. Identity and Access Management (IAM) systems encompass this but also provide a framework that goes beyond digital identities to providing access to users in various roles in a relatively automated fashion for cost and efficiency, while yet presenting minimal risk to sensitive data or equipment, simultaneously creating an audit trail for lawful compliance. Depending on the implementation needed by the enterprise (i.e. who is logging in and to what largely determines this) these concerns can be somewhat, highly, or totally overlapping areas. Making comparisons across suites of software and their vendors can be difficult as this apparently singular body of needs is serviced by vendors in this area in a highly modular fashion who bridge gaps with strategic or technical partnerships and integrations. But here "Identity Management" Software is defined as software which handles all or some of the tasks related to all of the above, which may be divided into: -- Identity governance or provisioning (basically role management with workflow controls). -- Access (authorization or restriction of access to certain information to certain persons across locations and systems). ...and the various methods of enabling rapid yet secure access like: -- Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without need for logging in again via help from a server). -- Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security, though at a cost of efficiency for each additional step). -- Password management and self-help for password users. -- Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access). -- Directory / User Repository Management for tracking of users with access, and -- Security Analytics for auditing and compliance... ...and more. IAM software is most usually sold in a modular, configurable pieces-sold-separately fashion, where each module handles some but not all of these needs. Some of the strongest vendors in this area offer high specialization and strategic partnerships with other specializers while other established vendors, via both acquisitions and development, manage to cobble together comprehensive portfolios and subsume all the various needs under one grand suite of comprehensive IAM capabilities. Enterprises have gone both ways. A later arriving area of identity management software that greatly up-prioritizes speed and ease of access over security is called by the vendors who specialize in it Customer Identity Management, which provides simple customer registration most often via Social Sign-On capability. This allows a user to instantaneously set up an account with a service provider merely by logging in via their preferred social network account; voila, the customer has (safe, limited) access, and the enterprise gains useful information about the potential customer in less than five seconds. While traditional Identity Management Systems offer the capability to do this, smaller vendors who specialize in customer access, with its high-efficiency / low-security demands, sometimes bundle the feature with other common marketing capabilities to leverage the instantly acquired customer data (e.g. email marketing, segmentation, landing pages, etc.), thus creating a (growing) niche of customer-facing identity management systems in the process.LastPass for Business1https://media.trustradius.com/product-logos/0m/wB/3TPTE2MFEL1P-180x180.PNGOkta Workforce Identity2https://media.trustradius.com/product-logos/wL/VF/XZVJG3Z9WVSS-180x180.PNGIdaptive Next-Gen Access (formerly Centrify)3https://media.trustradius.com/product-logos/Co/uw/X6S7STATKRXE-180x180.JPEG1Password4https://media.trustradius.com/product-logos/8V/Z2/T8URTTOH0ZXB-180x180.PNGAzure Active Directory5https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGWatchGuard AuthPoint6https://media.trustradius.com/product-logos/92/8u/7QGQ3JW39HTT-180x180.JPEGRSA SecurID Suite7https://media.trustradius.com/product-logos/Ws/Xz/J9NUOOJ4LT2P-180x180.JPEGOneLogin8https://media.trustradius.com/vendor-logos/B1/Q8/EO2P4K6DFDS7-180x180.PNGCyberArk Privileged Account Security9https://media.trustradius.com/vendor-logos/Zq/xO/OFRI13T14IB9-180x180.JPEGVaronis Data Security Platform10https://media.trustradius.com/vendor-logos/we/Tp/C8UBIDF7D32L-180x180.PNGIdentityIQ11https://media.trustradius.com/vendor-logos/KN/9V/23QMTZ8I4RZQ-180x180.PNGIBM Cloud App ID12https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGKaseya AuthAnvil13https://media.trustradius.com/vendor-logos/wL/TK/Q78Z6I6AR6BK-180x180.JPEGAuth014https://media.trustradius.com/vendor-logos/tm/Jr/PFZPLC1OE644-180x180.JPEGOracle Identity Governance15https://media.trustradius.com/vendor-logos/e7/6G/F3JK0T3RS775-180x180.PNGSolarWinds Access Rights Manager16https://media.trustradius.com/product-logos/Rf/Jy/DI903HA5JF0Q-180x180.PNGBeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto17https://media.trustradius.com/vendor-logos/oY/99/9C3PBM0AMI36-180x180.JPEGForefront Identity Manager (Discontinued)18https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGADManager Plus19https://media.trustradius.com/vendor-logos/OI/Uf/DCSFFAOHFQC2-180x180.PNGOracle Identity Management20https://media.trustradius.com/vendor-logos/e7/6G/F3JK0T3RS775-180x180.PNGIBM Security Identity and Access Manager21https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGAvatier Identity Management Software Suite22https://media.trustradius.com/product-logos/yP/Yx/BOZC8HN91JB0-180x180.PNGHypersocket23https://media.trustradius.com/vendor-logos/LV/cE/JOU6DQHSU9JG-180x180.JPEGOracle Identity Cloud Service24https://media.trustradius.com/vendor-logos/e7/6G/F3JK0T3RS775-180x180.PNGLoginRadius25https://media.trustradius.com/product-logos/IB/Xm/0GB9L4C6SL49-180x180.JPEG

Identity Management Solutions

Best Identity Management Solutions

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Solutions Overview

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

The IT Environment

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

How Identity Management Solution Helps

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

Listings (1-25 of 119)

LastPass for Business

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
134 Ratings

LastPass, a LogMeIn company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing, and other features.

Okta Workforce Identity

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
162 Ratings

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become mo…

Idaptive Next-Gen Access Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through its Next-Gen Access, w…

1Password

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
81 Ratings

AgileBits in Toronto offers 1Password, a password manager available to both private individuals and businesses, touting a unique approach to multi-factor authentication to improve security.

Azure Active Directory

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
84 Ratings

Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration with…

WatchGuard AuthPoint

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
30 Ratings

WatchGuard AuthPoint is a multi-factor authentication (MFA) service that helps companies keep their assets, information, and user identities secure. Multi-factor authentication solutions can enable organizations to close security gaps that leave companies vulnerable to breaches by adding a layer of …

The RSA SecurID Suite is an identity management, authentication and user provisioning offering supported by EMC's security division, RSA. The SecurID Suite includes SecurID Access 2FA and multi-factor authentication solutions and RSA Identity Governance & Lifecycle products.

OneLogin

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
40 Ratings

OneLogin is the eponymous identity and access management (IAM) product from the company in San Francisco featuring single sign-on (SSO), multi-factor authentication, provisioning, cloud directory, and more.

CyberArk is a privileged account and access security suite issued by the company of the same name in Massachusetts . The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical a…

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

12 Ratings

SailPoint's IdentityIQ provides enterprise-level cloud-based or installed identity and access management (IAM) software featuring single sign-on (SSO), password management, provisioning, role management, and identity intelligence for audit purposes.

IBM Cloud App ID helps developers who are not security experts to easily add authentication to their apps, and protect their APIs and app back-ends running on IBM Cloud. Developers can add a variety of login-in types: Email or username and passwordEnterpriseSocial App ID includes a cloud user rep…

7 Ratings

Auth0 is an Identity Management platform containing Single Sign On (SSO), Breached Password detection, Multi-Factor Authentication and many other related capabilities.

SolarWinds Access Rights Manager (ARM) is designed to assist IT and security admins to quickly and easily provision, deprovision, manage and audit user access rights to systems, data, and files. By analyzing user authorizations and access permission you get visualization of who has access to what an…

IBM Security Identity and Access Manager is a configurable IAM platform for identity assurance, mobile-login, enterprise-grade security of data and threat prevention, password protection and single sign-on, directory with auditing and privileges, partner gateway, and more. The "Tivoli" brand name re…

The vendor promises that Avatier delivers a private-cloud instance or on-premise Identity Governance & Administration (IGA) platform in just minutes using modern secure, extremely scalable Docker containers with orchestration. Avatier says that their continuous delivery IGA solution enables org…

2 Ratings

Hypersocket (formerly Nervepoint) enables organizations to efficiently manage and administer end users and their access to disparate systems by empowering end users to manage their own accounts across multiple systems both on-premise and in the cloud, while allowing IT to gain control over user spr…

The Oracle Identity Cloud Service is a PaaS security and identity platform which provides hybrid identity features to maintain a single identity for each user across their on-premise and in the cloud services while delivering a seamless user experience.

3 Ratings

LoginRadius is a customer identity platform that helps companies deliver a streamlined login process while protecting digital accounts and complying with data privacy regulations. The vendor says LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platfo…

TrustRadius Top Rated for 2019

2019 Top Rated Identity Management Solutions

There are plenty of options out there, but here's our shortlist of the best Identity Management Solutions. These products won a Top Rated award for having excellent customer satisfaction ratings. The list is based purely on reviews; there is no paid placement, and analyst opinions do not influence the rankings. To qualify, a product must have 10 or more recent reviews and a trScore of 7.5 or higher, indicating above-average satisfaction for business technology. The products with the highest trScores appear first on the list. Read more about the Top Rated criteria.