Best Identity Management Solutions83Identity Management (IdM) is essentially about creating, maintaining, and retiring individual enterprise accounts for IT security. Identity and Access Management (IAM) systems encompass this but also provide a framework that goes beyond digital identities to providing access to users in various roles in a relatively automated fashion for cost and efficiency, while yet presenting minimal risk to sensitive data or equipment, simultaneously creating an audit trail for lawful compliance. Depending on the implementation needed by the enterprise (i.e. who is logging in and to what largely determines this) these concerns can be somewhat, highly, or totally overlapping areas. Making comparisons across suites of software and their vendors can be difficult as this apparently singular body of needs is serviced by vendors in this area in a highly modular fashion who bridge gaps with strategic or technical partnerships and integrations. But here "Identity Management" Software is defined as software which handles all or some of the tasks related to all of the above, which may be divided into: -- Identity governance or provisioning (basically role management with workflow controls). -- Access (authorization or restriction of access to certain information to certain persons across locations and systems). ...and the various methods of enabling rapid yet secure access like: -- Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without need for logging in again via help from a server). -- Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security, though at a cost of efficiency for each additional step). -- Password management and self-help for password users. -- Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access). -- Directory / User Repository Management for tracking of users with access, and -- Security Analytics for auditing and compliance... ...and more. IAM software is most usually sold in a modular, configurable pieces-sold-separately fashion, where each module handles some but not all of these needs. Some of the strongest vendors in this area offer high specialization and strategic partnerships with other specializers while other established vendors, via both acquisitions and development, manage to cobble together comprehensive portfolios and subsume all the various needs under one grand suite of comprehensive IAM capabilities. Enterprises have gone both ways. A later arriving area of identity management software that greatly up-prioritizes speed and ease of access over security is called by the vendors who specialize in it Customer Identity Management, which provides simple customer registration most often via Social Sign-On capability. This allows a user to instantaneously set up an account with a service provider merely by logging in via their preferred social network account; voila, the customer has (safe, limited) access, and the enterprise gains useful information about the potential customer in less than five seconds. While traditional Identity Management Systems offer the capability to do this, smaller vendors who specialize in customer access, with its high-efficiency / low-security demands, sometimes bundle the feature with other common marketing capabilities to leverage the instantly acquired customer data (e.g. email marketing, segmentation, landing pages, etc.), thus creating a (growing) niche of customer-facing identity management systems in the process.Keyfactor Command1https://media.trustradius.com/vendor-logos/eV/no/3FXQJEMRVDNA-180x180.JPEGVynamic Security Access Protection2https://media.trustradius.com/vendor-logos/6f/nZ/16ZZEPNUXFPL-180x180.JPEGLeidos IDHaystack3https://media.trustradius.com/vendor-logos/lA/xh/CTJT9WACO2XX-180x180.JPEGOptimal IdM4https://media.trustradius.com/vendor-logos/EH/wj/X1U2THW4BE4T-180x180.JPEGMonoSign5https://media.trustradius.com/product-logos/S7/oK/9ZH8R020703B-180x180.PNGKeyhub6https://media.trustradius.com/product-logos/WX/wI/G2GTDSLZZBPG-180x180.PNGEnzoic Account Takeover Protection7https://media.trustradius.com/product-logos/84/0C/0FH3223GT8DM-180x180.PNGEmpowerID8https://media.trustradius.com/product-logos/AJ/zZ/9D3Z7UBGC6U8.pngEngage Live Sales Dashboard9https://media.trustradius.com/vendor-logos/zT/AJ/6T83S5VN03V2-180x180.PNGBeyondTrust Active Directory (AD) Bridge10https://media.trustradius.com/product-logos/D6/Zo/1MSAS7ZEJET4-180x180.JPEGTivoli Access Manager11https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGIBM Security Identity Governance12https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGIBM Cloud Identity Services13https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGF5 BIG-IP Access Policy Manager14https://media.trustradius.com/vendor-logos/oO/bi/C802NVLZVC9G.pngMicrosoft Identity Manager15https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGForgeRock OpenIDM16https://media.trustradius.com/product-logos/1U/9n/27RS9HR4BJ5E.pngCentrify Zero Trust Privilege Services17https://media.trustradius.com/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEGSingle Connect18https://media.trustradius.com/product-logos/Qy/ps/MGJHDWFCOXQH-180x180.PNGFortiAuthenticator19https://media.trustradius.com/vendor-logos/MZ/NA/I0WLZ36A46RB-180x180.JPEGSecureAuth IdP20https://media.trustradius.com/product-logos/pG/Nl/UTFMWMBX0SZV-180x180.JPEGEnterprise Single Sign-On Manager21https://media.trustradius.com/vendor-logos/zz/7e/2I48ETZZ2HNP-180x180.JPEG

Identity Management Solutions

Best Identity Management Solutions

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Solutions Overview

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

The IT Environment

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

How Identity Management Solution Helps

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

Listings (101-121 of 121)

We don't have enough ratings and reviews to provide an overall score.

Keyfactor (formerly Certified Security Solutions or CSS) headquartered in Cleveland offers Keyfactor Command, an end-to-end identity management solution for IoT devices and edge.

We don't have enough ratings and reviews to provide an overall score.

Diebold Nixdorf offers the Vynamic Security Access Protection system to retailers and financial institutions for securing endpoints, ATMs, and other devices from intruders and unauthorized usage, providing access logs, a security interface, and other features.

We don't have enough ratings and reviews to provide an overall score.

Optimal IdM headquartered in Lutz offers their suite of identity and access management solutions, on-premise or hosted and featuring multi-factor authentication or authentication-as-a-service, federated identity with single sign-on (SSO), and related features.

We don't have enough ratings and reviews to provide an overall score.

MonoSign is an enterprise-level cloud-based or on-premise installed Identity and Access Management (IAM) software featuring single sign-on (SSO), multi-factor authentication (MFA), password management, provisioning, lifecycle management, unified directory, role management, and identity intelligence …

We don't have enough ratings and reviews to provide an overall score.

Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provides deep subdomain and internal network scans, in-dashboard system health overview, easy-to-navigate…

We don't have enough ratings and reviews to provide an overall score.

Credential screening for online accounts can help prevent account takeover. Credential screening is the process of seamlessly screening usernames and passwords to identify if they have been compromised. These systems compare users’ credentials to large databases of leaked credentials in order to fin…

We don't have enough ratings and reviews to provide an overall score.

EmpowerID from the company of the same name in Ohio is an identity and access management (IAM) platform providing variable security, provisioning, SSO, and access solutions for global enterprises and companies of varying size and industries.

We don't have enough ratings and reviews to provide an overall score.

The Engage Live Sales Dashboard is an HTML5, browser-based interface that enables users to log into and initiate real-time sales with their web-based visitors, prospects, customers and partners. From this central location users can share their availability (online status), manage real-time conversat…

We don't have enough ratings and reviews to provide an overall score.

Microsoft Identity Manager replaces Forefront Identity Manager (FIM) as Microsoft's cloud-based IAM. It supports synchronizing identities between directories, databases and apps, self-service password, group and certificate management and increases admin security with policies, privileged access an…

We don't have enough ratings and reviews to provide an overall score.

ForgeRock is a relatively new but fast growing San Francisco company offering an open source identity and access management (IAM) platform called OpenIDM, that is modular and configurable to manage employee, customer, or citizen (for government) identities. ForgeRock has raised $52 million in ventur…

We don't have enough ratings and reviews to provide an overall score.

Single Connect™ is a privileged access management platform from Kron which is offered to bring privileged accounts under control. With a range of products, Single Connect™ unifies privileged session management, password management, two-factor authentication, database access management and logging, d…

We don't have enough ratings and reviews to provide an overall score.

Fortinet offers FortiAuthenticator, an identity and authentication product available as an appliance or virtual machine to identify network users and enforce identity-driven policy across an enterprise network. FortiAuthenticator supports 2FA and single sign-on (SSO).

We don't have enough ratings and reviews to provide an overall score.

SecureAuth is an identity and adaptive access management solution from the company of the same name in Irvine, California, featuring 2FA or multi-factor authentication, adaptive authentication, and user self-service (e.g. password).

TrustRadius Top Rated for 2020

2020 Top Rated Identity Management Solutions

There are plenty of options out there, but here's our shortlist of the best Identity Management Solutions. These products won a Top Rated award for having excellent customer satisfaction ratings. The list is based purely on reviews; there is no paid placement, and analyst opinions do not influence the rankings. To qualify, a product must have 10 or more recent reviews and a trScore of 7.5 or higher, indicating above-average satisfaction for business technology. The products with the highest trScores appear first on the list. Read more about the Top Rated criteria.