Best Identity Management Software83Identity Management (IdM) is essentially about creating, maintaining, and retiring individual enterprise accounts for IT security. Identity and Access Management (IAM) systems encompass this but also provide a framework that goes beyond digital identities to providing access to users in various roles in a relatively automated fashion for cost and efficiency, while yet presenting minimal risk to sensitive data or equipment, simultaneously creating an audit trail for lawful compliance. Depending on the implementation needed by the enterprise (i.e. who is logging in and to what largely determines this) these concerns can be somewhat, highly, or totally overlapping areas. Making comparisons across suites of software and their vendors can be difficult as this apparently singular body of needs is serviced by vendors in this area in a highly modular fashion who bridge gaps with strategic or technical partnerships and integrations. But here "Identity Management" Software is defined as software which handles all or some of the tasks related to all of the above, which may be divided into: -- Identity governance or provisioning (basically role management with workflow controls). -- Access (authorization or restriction of access to certain information to certain persons across locations and systems). ...and the various methods of enabling rapid yet secure access like: -- Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without need for logging in again via help from a server). -- Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security, though at a cost of efficiency for each additional step). -- Password management and self-help for password users. -- Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access). -- Directory / User Repository Management for tracking of users with access, and -- Security Analytics for auditing and compliance... ...and more. IAM software is most usually sold in a modular, configurable pieces-sold-separately fashion, where each module handles some but not all of these needs. Some of the strongest vendors in this area offer high specialization and strategic partnerships with other specializers while other established vendors, via both acquisitions and development, manage to cobble together comprehensive portfolios and subsume all the various needs under one grand suite of comprehensive IAM capabilities. Enterprises have gone both ways. A later arriving area of identity management software that greatly up-prioritizes speed and ease of access over security is called by the vendors who specialize in it Customer Identity Management, which provides simple customer registration most often via Social Sign-On capability. This allows a user to instantaneously set up an account with a service provider merely by logging in via their preferred social network account; voila, the customer has (safe, limited) access, and the enterprise gains useful information about the potential customer in less than five seconds. While traditional Identity Management Systems offer the capability to do this, smaller vendors who specialize in customer access, with its high-efficiency / low-security demands, sometimes bundle the feature with other common marketing capabilities to leverage the instantly acquired customer data (e.g. email marketing, segmentation, landing pages, etc.), thus creating a (growing) niche of customer-facing identity management systems in the process.GARANCY IAM (formerly SAM Enteprise)1https://media.trustradius.com/product-logos/an/9t/3IKHONIORQZW.jpegUserLock2https://media.trustradius.com/product-logos/jk/wo/QPPC3UNM0G6F-180x180.JPEGOpenIAM Identity and Access Management3https://media.trustradius.com/product-logos/1T/k1/1O4MZDXI94TP.pngTivoli Identity Manager4https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGFischer Identity Suite5https://media.trustradius.com/product-logos/ov/RM/FT7533EO1J65.jpegIdentity Audit & Compliance Manager6https://media.trustradius.com/product-logos/Sb/M2/ORIF5FSQ7TGG.jpegTivoli Access Manager7https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGEmpowerID8https://media.trustradius.com/product-logos/AJ/zZ/9D3Z7UBGC6U8.pngSimeio9https://media.trustradius.com/product-logos/1T/5U/QK6EOADRIQIK.pngOmada Identity Suite10https://media.trustradius.com/product-logos/ue/bn/DOOCP71T38BO.pngIdentity Automation RapidIdentity11https://media.trustradius.com/vendor-logos/IE/67/WNKZCQ03T7U3-180x180.PNGiWelcome12https://media.trustradius.com/product-logos/fK/XB/3CBO3VOQU2XH.jpegSecureAuth IdP13https://media.trustradius.com/product-logos/pG/Nl/UTFMWMBX0SZV-180x180.JPEGBrainwave14https://media.trustradius.com/product-logos/P0/t5/2G1EDCN2TOSL.jpegEkran System15https://media.trustradius.com/product-logos/QG/K8/DPPIV6GMRF4U-180x180.PNGIdentity Plus16https://media.trustradius.com/product-logos/jB/r7/DRU150AWSI5K-180x180.PNGForgeRock OpenIDM17https://media.trustradius.com/product-logos/1U/9n/27RS9HR4BJ5E.pngMeibo18https://media.trustradius.com/product-logos/28/TF/7HB7ELWFCDXA.pngServiceControl19https://media.trustradius.com/product-logos/o4/4W/9EJ79WATT09L-180x180.JPEGEfecte Identity Management20https://media.trustradius.com/product-logos/ub/Ze/3CV4PC1OBL4P.pngAccessMatrix Universal Authentication Server21https://media.trustradius.com/vendor-logos/GC/zd/H0F5FS3QQ12U-180x180.JPEGSafeNet Trusted Access22https://media.trustradius.com/product-logos/vW/kz/D0MVWZKKA5I8-180x180.JPEGLayer7 Directory (formerly CA Directory)23https://media.trustradius.com/vendor-logos/XC/qb/OEOG2461M9II-180x180.JPEGCore Access Assurance Suite24https://media.trustradius.com/product-logos/Uv/1w/Z3XPRNVLJUDU-180x180.PNGPortadi25https://media.trustradius.com/product-logos/3G/4W/S8F048AWOHI8.png

Identity Management Software

Best Identity Management Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Software Overview

What is Identity Management Software?

Identity management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity management software is to improve security and employee productivity. It should also lower costs while managing user identities and credentials.

Identity Management Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

The IT Environment

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes compliance especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

How Identity Management Software Helps

Identity management tools make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. The tools also supply self-service capabilities for end users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

Listings (51-75 of 118)

We don't have enough ratings and reviews to provide an overall score.

UserLock from IS Decisions is a network access control and identity management solution.

We don't have enough ratings and reviews to provide an overall score.

Fischer Identity is a cloud-based or on-premise identity management solution from Fischer International Identity headquartered in Naples, Florida, featuring access controls, password management, single sign-on (SSO), role and privilege management, and more, with a particular focus on institutions...

We don't have enough ratings and reviews to provide an overall score.

Singaporan company Deep Identity offers enterprise-grade identity governance and access management software with an emphasis on data access security, auditing, and compliance: Identity Audit and Compliance Manager (Deep IACM). In late 2014 early-stage investor Get2volume raised $470,000 so that D...

We don't have enough ratings and reviews to provide an overall score.

EmpowerID from the company of the same name in Ohio is an identity and access management (IAM) platform providing variable security, provisioning, SSO, and access solutions for global enterprises and companies of varying size and industries.

We don't have enough ratings and reviews to provide an overall score.

Simeio Solutions, LLC is a systems integration and compliance services company specializing in enterprise security. We provide professional services, managed services and Software as a Service (SaaS) in the areas of identity and access management (IAM), role-based access controls (RBAC), and IT ...

We don't have enough ratings and reviews to provide an overall score.

Omada Identity Suite is the eponymous flagship toolset for identity and access management (IAM) from the relatively established Danish software company for access governance and compliance on the enterprise level.

We don't have enough ratings and reviews to provide an overall score.

iWelcome is a Dutch company which provides cloud-based identity and access management (IAM).

We don't have enough ratings and reviews to provide an overall score.

SecureAuth is an identity and adaptive access management solution from the company of the same name in Irvine, California, featuring 2FA or multi-factor authentication, adaptive authentication, and user self-service (e.g. password).

We don't have enough ratings and reviews to provide an overall score.

French software company Brainwave offers Brainwave Identity GRC, an enterprise-level identity and access management (IAM) solution dedicated to protection of assets, compliance, and reporting.

We don't have enough ratings and reviews to provide an overall score.

Cloud Labs was established in 2013 in Budapest, Hungary, by a group of experienced digital security specialists. At the late 2013, the first official market version of Ekran Systems was released. The company, supported by private investors in Hungary, focuses on the development of Ekran System pr...

We don't have enough ratings and reviews to provide an overall score.

Ilantus is a pioneering force in the identity and Access Management domain. For more than 15 years Ilantus has been passionately providing unprecedented service to its customers addressing their pain points in record time and at reasonable cost. Ilantus products have won acclaim from customers ac...

We don't have enough ratings and reviews to provide an overall score.

ForgeRock is a relatively new but fast growing San Francisco company offering an open source identity and access management (IAM) platform called OpenIDM, that is modular and configurable to manage employee, customer, or citizen (for government) identities. ForgeRock has raised $52 million in ven...

We don't have enough ratings and reviews to provide an overall score.

Relatively established French headquartered company Ilex International (founded in 1989 and dominant in France) offers Meibo, an enterprise-level identity and access management (IAM) solution, with services recently expanded to the UK.

We don't have enough ratings and reviews to provide an overall score.

ServiceControl provides an identity management solution. The company aims to provide a simpler way to create, manage, and audit accounts across multiple systems. ServiceControl has locations in the US, Canada, Germany, and Chile.

We don't have enough ratings and reviews to provide an overall score.

Scandinavian company Efecte offers an enterprise-level identity and access management solution. The technology originates from RM5 Software, a recognized Scandinavian company, acquired by Efecte to expand its offerings.

We don't have enough ratings and reviews to provide an overall score.

Gemalto, a Thales company since the April 2019 acquisition, provides a cloud-based identity-as-a-service (IaaS), user provisioning, and single sign-on (SSO) solution.

We don't have enough ratings and reviews to provide an overall score.

Core (formerly Courion) Access Assurance Suite from Core Security is an enterprise-level identity and access management (IAM) solution containing an entire toolset of IAM task managers to automate creating and managing user accounts, self-service password reset, role policies and access rights, a...

We don't have enough ratings and reviews to provide an overall score.

Portadi, headquartered in Santa Clara, California, offers a cloud access panel for business applications, a single sign-on solution.