Identity Management Solutions

Top Rated Identity Management Products

These products won a Top Rated award for having excellent customer satisfaction ratings. The list is based purely on reviews; there is no paid placement, and analyst opinions do not influence the rankings. Read more about the Top Rated criteria.

Identity Management Solutions TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Solutions Overview

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

Challenges from Distributed Identity-Based Systems

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

The latest solution to managing distributed identity-based systems is Identity-as-a-Service (IDaaS). IDaaS is a cloud-based service offered by identity management vendors that outsources identity management to the vendor, especially in regards to access management for SaaS applications. In most cases, employees and other end users utilize Single Sign-On to access all of their business systems and applications. The vendor handles all of the identity management and authorization protocols on behalf of the business, saving the organization maintenance and overhead costs in the process.

Identity Centralization and Privileged Access Management

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Identity management solutions also enable businesses to utilize more granular privileged access management (PAM). Privileged access management ties users’ identities to specific privileges within different systems and applications. PAM capabilities limit the number of unnecessary access privileges that users have, minimizing the risk that comes with such excess privileges. Identity management software with PAM features, or standalone PAM products, also streamline privilege management for IT administrators, improving efficiency and security simultaneously.

Identity Management Solution Comparisons

There are some common factors to consider when comparing identity management solutions:
  1. Identity management suite vs. password management solution: Many identity management solutions started out as password management tools which then expanded into identity management. These products will likely excel at ease of use and integrations with popular 3rd party systems. In contrast, identity management suites with a legacy of identity management will likely be more robust for complex or large-scale identity management needs.

  2. User-focus vs. data security focus: same goals, but user-focus is more focused on making end-user’s identity management processes easier. In contrast, data security is more aligned with privileged access management, which prioritizes minimizing the attack surface of a business’s systems and data.

  3. SMB vs. Enterprise Users: Many identity management products skew towards either the SMB or the Enterprise markets. SMB-focused products will likely be easier to use with a greater focus on efficiency and self-service, while enterprise products will be more scalable and robust for IT administrators. Buyers can consider the distribution of reviews across SMB and enterprise reviews as a signpost of where a product may lie on this spectrum.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

(1-25 of 134) Sorted by Most Reviews

ThisData

ThisData offers real-time detection of Account Takeover (ATO) attacks for web and mobile applications. ThisData provides users with total visibility with zero configuration required. How ThisData works: • Real-time detection of account takeover via analysis contextual user information.…

QuickLaunch

QuickLaunch is single sign-on software that enables institutions & organizations to manage identity & access control. It aims to help organizations achieve a balance between delivering seamless yet secure access to end users while empowering IT teams with the visibility and…

AccessMatrix Universal Access Management

IAM specialist i-Sprint offers AccessMatrix Universal Access Management (UAM), combines web and federated single sign-on (SSO), web access management, hierarchy based delegated administration, to achieve application security.

Blackberry Enterprise Identity

Blackberry Enterprise Identity is the company's identity and access management and security suite which emphasizes single-sign on convenience with no sacrifice in security.

Telos ID DAC

Telos ID Designated Aviation Channeling service (DAC) is a TSA-approved background security check solution provided to airports or aviation agencies which provides data integrity and check accuracy, from Telos Corporation.

Imprivata PatientSecure

Imprivata PatientSecure is a positive patient identification using biometric identification dedicated to protecting patient safety and privacy, and which also supports data integrity with error identification and remediation (e.g. removal of duplicates).

FortiAuthenticator

Fortinet offers FortiAuthenticator, an identity and authentication product available as an appliance or virtual machine to identify network users and enforce identity-driven policy across an enterprise network. FortiAuthenticator supports 2FA and single sign-on (SSO).

Microsoft Identity Manager

Microsoft Identity Manager replaces Forefront Identity Manager (FIM) as Microsoft's cloud-based IAM. It supports synchronizing identities between directories, databases and apps, self-service password, group and certificate management and increases admin security with policies,…

HelloID

HelloID is cloud based Single Sign on software that has modules like Access Management, Service Automation, and Data Management. HelloID calls itself a lower cost alternative to other SSO options without sacrificing functionality. With service automation, managers can track which…

Micro Focus Identity and Access Management

Micro Focus Identity and Access Management is used for managing identity management policies across local, mobile and cloud environments. The platform provides Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory…

Avigilon Access Control Manager (ACM)

Avigilon Access Control Manager (ACM), from Motorola Solutions company Avigilon, is a video surveillance management and access management solution for enterprises.

Vynamic Security Access Protection

Diebold Nixdorf offers the Vynamic Security Access Protection system to retailers and financial institutions for securing endpoints, ATMs, and other devices from intruders and unauthorized usage, providing access logs, a security interface, and other features.

Leidos IDHaystack

Leidos offers IDHaystack, an identity as a service.

Enzoic Account Takeover Protection

Credential screening for online accounts can help prevent account takeover. Credential screening is the process of seamlessly screening usernames and passwords to identify if they have been compromised. These systems compare users’ credentials to large databases of leaked credentials…

Keyhub

Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provides deep subdomain and internal network scans, in-dashboard system health overview,…

MonoSign

MonoSign is an enterprise-level cloud-based or on-premise installed Identity and Access Management (IAM) software featuring single sign-on (SSO), multi-factor authentication (MFA), password management, provisioning, lifecycle management, unified directory, role management, and identity…

F5 BIG-IP Access Policy Manager

F5 Networks provides BIG-IP Access Policy Manager as an identity and access solution which can be deployed as a standalone solution or as an add-on to F5 Networks' flagship BIG-IP TLM or F5 Advanced WAF applications.

Optimal IdM

Optimal IdM headquartered in Lutz offers their suite of identity and access management solutions, on-premise or hosted and featuring multi-factor authentication or authentication-as-a-service, federated identity with single sign-on (SSO), and related features.

iComplyKYC

iComplyKYC is all-in-one AML software made for financial service providers, designed to make it easy to collect, maintain, and analyze KYC data, improve the way institutions manage risk, onboard clients, automate workflows, and maintain a robust, global compliance program. It’s designed…

BeyondTrust Active Directory (AD) Bridge

BeyondTrust Active Directory Bridge centralizes authentication and configuration management for Unix, Linux, and Mac environments by extending Active Directory’s Kerberos authentication and single sign-on and Group Policy capabilities to these platforms.

Piano ID

Piano ID is presented by the vendor as Identity management made for media. With it, users can manage customers’ identities and provide single sign-on and access control for every point of engagement — print, digital, mobile web, native apps, and TV-anywhere devices.

Privilege Identity Manager (DEEP PIM)

Deep Privilege Identity Manager (Deep PIM) is presented by the vendor as a practical and nonintrusive solution to address privilege identity related challenges in any organizations. Deep PIM is built as plug-ins on top of Deep Identity Manager (Deep IM) and comes with Privilege…

Identity Audit & Compliance Manager (DEEP IACM)

Deep Identity Audit & Compliance Manager (Deep IACM) provides a ‘layered approach’ to identity governance and administration. Deep IACM does this by discovering deep into applications, databases and systems, where users and their access permissions are stored. While the typical…

Single Connect

Single Connect™ is a privileged access management platform from Kron which is offered to bring privileged accounts under control. With a range of products, Single Connect™ unifies privileged session management, password management, two-factor authentication, database access management…

AWS Directory Service

AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft AD, is an AWS-managed directory service built on actual Microsoft Active Directory and powered by Windows Server 2012 R2.

Frequently Asked Questions

How does identity management software work?

Identity management software tracks users’ credentials and accounts in a central repository, enabling more centralization and security.

What’s the difference between identity management and privileged access management?

Identity management enables privileged access management by providing the system of record for user’s credentials and information. PAM then uses those credentials to assign specific privileges.

Does my business need identity management software?

A business should consider investing in identity management software if it leverages more than 1 or 2 protected systems with proprietary, sensitive, or business-critical data.

What are the benefits of an identity management system?

Identity management systems allow IT administrators to work more efficiently, saving time and money. They also improve business security, mitigating risks and potential breaches.

How much does identity management software cost?

Identity management software is most commonly priced per month, per user, up to $35/user/month for large deployments. Some vendors also offer specific features, like API access management or MFA, a la carte.

What is IDaaS?

IDaaS is a cloud-based form of identity management where the vendor handles the infrastructure and authentication protocols that allow end users to access the business systems.