Identity Management Solutions

Top Rated Identity Management Products

TrustRadius Top Rated for 2021

These products won a Top Rated award for having excellent customer satisfaction ratings. The list is based purely on reviews; there is no paid placement, and analyst opinions do not influence the rankings. Read more about the Top Rated criteria.

Identity Management Solutions TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Solutions Overview

What are Identity Management Solutions?


Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities


  • Access (authorization or restriction of access to certain information to certain persons across locations and systems)

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server)

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access)

  • Directory / User Repository Management for tracking of users with access

  • Security Analytics for auditing and compliance

Challenges from Distributed Identity-Based Systems


The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

The latest solution to managing distributed identity-based systems is Identity-as-a-Service (IDaaS). IDaaS is a cloud-based service offered by identity management vendors that outsources identity management to the vendor, especially in regards to access management for SaaS applications. In most cases, employees and other end users utilize Single Sign-On to access all of their business systems and applications. The vendor handles all of the identity management and authorization protocols on behalf of the business, saving the organization maintenance and overhead costs in the process.

Identity Centralization and Privileged Access Management


Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Identity management solutions also enable businesses to utilize more granular privileged access management (PAM). Privileged access management ties users’ identities to specific privileges within different systems and applications. PAM capabilities limit the number of unnecessary access privileges that users have, minimizing the risk that comes with such excess privileges. Identity management software with PAM features, or standalone PAM products, also streamline privilege management for IT administrators, improving efficiency and security simultaneously.

Identity Management Solution Comparisons



There are some common factors to consider when comparing identity management solutions:
  1. Identity management suite vs. password management solution: Many identity management solutions started out as password management tools which then expanded into identity management. These products will likely excel at ease of use and integrations with popular 3rd party systems. In contrast, identity management suites with a legacy of identity management will likely be more robust for complex or large-scale identity management needs.

  2. User-focus vs. data security focus: same goals, but user-focus is more focused on making end-user’s identity management processes easier. In contrast, data security is more aligned with privileged access management, which prioritizes minimizing the attack surface of a business’s systems and data.

  3. SMB vs. Enterprise Users: Many identity management products skew towards either the SMB or the Enterprise markets. SMB-focused products will likely be easier to use with a greater focus on efficiency and self-service, while enterprise products will be more scalable and robust for IT administrators. Buyers can consider the distribution of reviews across SMB and enterprise reviews as a signpost of where a product may lie on this spectrum.

Pricing Information


Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

(26-50 of 149) Sorted by Most Reviews

Avatier Identity Anywhere

The vendor aims to deliver seamless workforce access while maintaining security. Avatier Identity Anywhere is a passwordless IGA solution that includes: user self service and HR driven lifecycle management universal workflow experience with push notificationservice catalog with…

RSA Access Manager (Discontinued)

The RSA Access Manager is an identity management that reached its end of sale in June 2019 (extended support will continue through 2021). As an identity and authentication solution RSA offers the SecurID Suite.

JumpCloud

JumpCloud Directory-as-a-Service® is a cloud-based platform that enables IT teams to securely manage user identities and connect them to resources they need regardless of provider, protocol, vendor, or location. Directory-as-a-Service gives organizations a single pane of glass to…

LoginRadius

LoginRadius is a customer identity platform that helps companies deliver a streamlined login process while protecting digital accounts and complying with data privacy regulations. The vendor says LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide.…

Oracle Identity Cloud Service

The Oracle Identity Cloud Service is a PaaS security and identity platform which provides hybrid identity features to maintain a single identity for each user across their on-premise and in the cloud services while delivering a seamless user experience.

Bitium

Bitium from the relatively new company (2012) of the same name is an identity and access management (IAM) platform for SMBs / mid-market companies featuring single sign-on (SSO), automated account creation and provisioning aids, directory integration, extra security features (e.g.…

Unifyed Student - Verify

Unifyed Verify identity management helps institutions provide their students, faculty and staff with secure, single-sign-on to the key applications that they need to learn and work. It also enables the campus community to self-sufficiently reset their passwords. Single Sign-On &…

AWS Organizations

AWS Organizations helps users centrally govern an environment as the organization grows, and scale workloads on AWS. Using AWS Organizations, users can automate account creation, create groups of accounts to reflect your business needs, and apply policies for these groups for governance.…

Univention Corporate Server (UCS)

Univention Corporate Server (UCS) is software that enables users to operate and manage complete IT infrastructures settled in distributed, heterogeneous and virtualized envorinments. No matter whether the user has 10, 100 or 10,000 employees: UCS aims to grow with the company and…

Access Auditor

Access Auditor from UK-based company SCC is an identity management and user provisioning solution.

SAP Identity Management

SAP NetWeaver Identity Management is the software acquired by SAP from MaXware for identity management (IdM).

WSO2 Identity Server

WSO2 Identity Server provides security and identity management of enterprise web applications, services, and APIs. The most recent version of Identity Server acts as an Enterprise Identity Bus (EIB) — a central backbone to connect and manage multiple identities regardless of the…

Transmit Security

Transmit Security headquartered in Boston offers their identity orchestration solution, providing strong customer authentication and authorization for entities that need it.

Microsoft Enterprise Mobility + Security

Microsoft Enterprise Mobility + Security is a suite of applications supporting mobile device and application security, MDM, as well as conditional or privileged access with multi-factor authentication, and advanced security reporting. Products in the suite includes Microsoft Intune…

FortiAuthenticator

Fortinet offers FortiAuthenticator, an identity and authentication product available as an appliance or virtual machine to identify network users and enforce identity-driven policy across an enterprise network. FortiAuthenticator supports 2FA and single sign-on (SSO).

One Identity Identity Manager

One Identity, a division of Quest, offers an identity management, governance, and privileged access solution via Identity Manager, a tool to mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving users access to data and applications they need and nothing…

NetIQ Identity Manager

NetIQ Idenity Manager is an identity management solution from Houston-based Micro Focus company NetIQ.

BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access enables security professionals to control, monitor, and manage access to critical systems by privileged users and third-party vendors. BeyondTrust says their unique approach allows companies to quickly gain control of system access and protect…

Symantec IGA (formerly Layer7 Identity Suite, from CA)

Symantec IGA (formerly Layer7 Identity Suite & CA Identity Suite) from Broadcom provides comprehensive identity management and governance capabilities. In addition, Symantec IGA performs risk analysis and certification and enables remediation actions in real-time during the access…

Workspace ONE Access (formerly VMware Identity Manager)

Workspace ONE Access, (formerly VMware Identity Manager), provides multi-factor authentication, conditional access and single sign-on to SaaS, web and native mobile apps.

AWS Identity & Access Management

AWS Identity and Access Management (IAM) enables users to manage access to AWS services and resources securely. Using IAM, users can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

Tivoli Identity Manager

Tivoli Identity Manager (TIM) is an identity management solution from IBM.

Hitachi ID Bravura Identity

Hitachi ID Identity Manager is designed to manage user accounts, identity information and security entitlements on a variety of systems and applications. Identity Manager is presented by the vendor as an integrated solution for managing identities, groups and security entitlements…

Engage Live Sales Dashboard

The Engage Live Sales Dashboard is an HTML5, browser-based interface that enables users to log into and initiate real-time sales with their web-based visitors, prospects, customers and partners. From this central location users can share their availability (online status), manage…

Enterprise Guardian

Enterprise Guardian is a suite of installed or cloud-based enterprise-grade identity and access management (IAM) tools for compliance and the protection of sensitive equipment and locations, from San Francisco-based company AlertEnterprise.

Frequently Asked Questions

How does identity management software work?

Identity management software tracks users’ credentials and accounts in a central repository, enabling more centralization and security.

What’s the difference between identity management and privileged access management?

Identity management enables privileged access management by providing the system of record for user’s credentials and information. PAM then uses those credentials to assign specific privileges.

Does my business need identity management software?

A business should consider investing in identity management software if it leverages more than 1 or 2 protected systems with proprietary, sensitive, or business-critical data.

What are the benefits of an identity management system?

Identity management systems allow IT administrators to work more efficiently, saving time and money. They also improve business security, mitigating risks and potential breaches.

How much does identity management software cost?

Identity management software is most commonly priced per month, per user, up to $35/user/month for large deployments. Some vendors also offer specific features, like API access management or MFA, a la carte.