IAM specialist i-Sprint offers AccessMatrix Universal Access Management (UAM), combines web and federated single sign-on (SSO), web access management, hierarchy based delegated administration, to achieve application security.
Identity Management Software
Best Identity Management Software
TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.
Identity Management Software Overview
What is Identity Management Software?
Identity management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity management software is to improve security and employee productivity. It should also lower costs while managing user identities and credentials.
Identity Management Features & Capabilities
Access (authorization or restriction of access to certain information to certain persons across locations and systems).
Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).
Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)
Password management and self-help for password users.
Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).
Directory / User Repository Management for tracking of users with access, and
Security Analytics for auditing and compliance...
The IT Environment
The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes compliance especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.
How Identity Management Software Helps
Identity management tools make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. The tools also supply self-service capabilities for end users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.
Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.
Identity Management Products
Listings (101-118 of 118)
Blackberry Enterprise Identity is the company's identity and access management and security suite which emphasizes single-sign on convenience with no sacrifice in security.
Telos ID Designated Aviation Channeling service (DAC) is a TSA-approved background security check solution provided to airports or aviation agencies which provides data integrity and check accuracy, from Telos Corporation.
Imprivata PatientSecure is a positive patient identification using biometric identification dedicated to protecting patient safety and privacy, and which also supports data integrity with error identification and remediation (e.g. removal of duplicates).
Microsoft Identity Manager replaces Forefront Identity Manager (FIM) as Microsoft's cloud-based IAM. It supports synchronizing identities between directories, databases and apps, self-service password, group and certificate management and increases admin security with policies, privileged access...
Fortinet offers FortiAuthenticator, an identity and authentication product available as an appliance or virtual machine to identify network users and enforce identity-driven policy across an enterprise network. FortiAuthenticator supports 2FA and single sign-on (SSO).
Micro Focus Identity and Access Management is used for managing identity management policies across local, mobile and cloud environments. The platform provides Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory (AD) administration.
Avigilon Access Control Manager (ACM), from Motorola Solutions company Avigilon, is a video surveillance management and access management solution for enterprises.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables...
HelloID is cloud based Single Sign on software that has modules like Access Management, Service Automation, and Data Management. HelloID calls itself a lower cost alternative to other SSO options without sacrificing functionality. With service automation, managers can track which applications and...
Keyfactor (formerly Certified Security Solutions or CSS) headquartered in Cleveland offers Keyfactor Command, an end-to-end identity management solution for IoT devices and edge.
Diebold Nixdorf offers the Vynamic Security Access Protection system to retailers and financial institutions for securing endpoints, ATMs, and other devices from intruders and unauthorized usage, providing access logs, a security interface, and other features.
Leidos offers IDHaystack, an identity as a service.
F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.
Optimal IdM headquartered in Lutz offers their suite of identity and access management solutions, on-premise or hosted and featuring multi-factor authentication or authentication-as-a-service, federated identity with single sign-on (SSO), and related features.
MonoSign is an enterprise-level cloud-based or on-premise installed Identity and Access Management (IAM) software featuring single sign-on (SSO), multi-factor authentication (MFA), password management, provisioning, lifecycle management, unified directory, role management, and identity intelligen...
Remme is an ecosystem of Identity and Access Management products with a digital key at its heart with the same level of resilience for both humans and machines. It offers the next-gen PKI Protocol as a the foundational layer to create and manage decentralized identities and their digital keys. It...
Credential screening for online accounts can help prevent account takeover. Credential screening is the process of seamlessly screening usernames and passwords to identify if they have been compromised. These systems compare users’ credentials to large databases of leaked credentials in order to ...