Identity Management Solutions

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
WatchGuard AuthPoint

AuthPoint Total Identity Security provides businesses with a solution to protect user accounts and credentials. With multi-factor authentication, password management, and dark web credential monitoring, AuthPoint mitigates the risks associated with workforce credential attacks.…

2
The Okta Identity Cloud

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta…

3
IBM Security Verify

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.

4
LastPass for Business

LastPass, a GoTo (formerly LogMeIn) company, is a password management application to simplify access to enterprise applications for users but also increase centrality and ease of management of access for administrators with task automation, convenient and secure password sharing,…

5
SAP Customer Data Solutions

The SAP Customer Data Cloud, based on Gigya (acquired by SAP in 2017) is a product suite that allows users to identify consumers, business customers, or partners across devices and channels to drive registrations and engagement; manage access, permission, and consent; and transform…

All Products

(51-75 of 271)

51
SecureAuth IdP

SecureAuth is an identity and adaptive access management solution from the company of the same name in Irvine, California, featuring 2FA or multi-factor authentication, adaptive authentication, and user self-service (e.g. password).

52
SAP Identity Management

SAP NetWeaver Identity Management is the software acquired by SAP from MaXware for identity management (IdM).

53
Univention Corporate Server (UCS)

Univention Corporate Server (UCS) is software that enables users to operate and manage complete IT infrastructures settled in distributed, heterogeneous and virtualized envorinments. No matter whether the user has 10, 100 or 10,000 employees: UCS aims to grow with the company and…

Explore recently added products

54
One Identity Identity Manager

One Identity, a division of Quest, offers an identity management, governance, and privileged access solution via Identity Manager, a tool to mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving users access to data and applications they need and nothing…

55
Delinea Server PAM

Delinea Server PAM solution (Cloud Suite and Server Suite) secures privileged access for servers on both on-premise and cloud/multi-cloud environments. It allows humans and machines to seamlessly authenticate, enforcing least privilege with just-in-time privilege elevation, increasing…

56
Akamai Identity Cloud

Akamai Identity Cloud (formerly Janrain, acquired January 2019) supports the collection of customer identity data through social and traditional registration and login as well as diverse engagement capabilities like Commenting, Ratings and Reviews and Live Chat. The customer identity…

57
AWS Identity & Access Management

AWS Identity and Access Management (IAM) enables users to manage access to AWS services and resources securely. Using IAM, users can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

58
WSO2 Identity Server

WSO2 Identity Server provides security and identity management of enterprise web applications, services, and APIs. The most recent version of Identity Server acts as an Enterprise Identity Bus (EIB) — a central backbone to connect and manage multiple identities regardless of the…

59
AWS Organizations

AWS Organizations helps users centrally govern an environment as the organization grows, and scale workloads on AWS. Using AWS Organizations, users can automate account creation, create groups of accounts to reflect your business needs, and apply policies for these groups for governance.…

60
NetIQ by OpenText

NetIQ secures organizations through a comprehensive set of identity and access services for workforce and customer identities.

61
Iris Powered by Generali

Iris Powered by Generali offers clients identity resolution experts and tech-forward solutions to uncomplicate the protection process. Their OnWatch product is presented as people-first, technology-forward identity protection that puts customers in control of their identity with…

62
Groupcall IdaaS

Groupcall IDaaS is a comprehensive identity management service designed around the unique needs of education. It’s a secure single sign-on service, based on the information stored in a school’s Management Information System (MIS), enabling staff and students to login just once to…

63
Passbase
0 reviews

Passbase is a digital identity solution that enables teams to integrate a suite of identity verification tools into their product with a few lines of code and a no-code solution. Passbase helps companies securely verify users from over 190 countries without having to store user data…

64
Vynamic Security Access Protection

Diebold Nixdorf offers the Vynamic Security Access Protection system to retailers and financial institutions for securing endpoints, ATMs, and other devices from intruders and unauthorized usage, providing access logs, a security interface, and other features.

65
Optimal IdM
0 reviews

Optimal IdM headquartered in Lutz offers their suite of identity and access management solutions, on-premise or hosted and featuring multi-factor authentication or authentication-as-a-service, federated identity with single sign-on (SSO), and related features.

66
MonoSign
0 reviews

MonoSign is an enterprise-level cloud-based or on-premise installed Identity and Access Management (IAM) software featuring single sign-on (SSO), multi-factor authentication (MFA), password management, provisioning, lifecycle management, unified directory, role management, and identity…

67
cidaas
0 reviews

cidaas, a European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With cidaas, companies create unique user identification for security across all channels.…

68
Fractal ID
0 reviews

Fractal is an identity verification platform, ranging from human uniqueness for sybil-resistance to KYC/AML for regulatory compliance. Fractal provides decentralized identity solutions for Web3 users and chains ensuring trustless systems and empowering users to exchange their data…

69
Censornet IAM
0 reviews

Censornet IAM enables single sign-on (SSO) and automatically authenticates users with rich contextual information. The solution helps to removes the risk of weak passwords being used across apps, replacing them entirely with secure tokens and assertions. It ultimately helps to provide…

70
Akkadian Provisioning Manager

Manual provisioning across multiple UC servers, clusters and applications is time-consuming and subject to errors or inconsistencies, requiring rework. So Akkadian Provisioning Manager is presented as an easy-to-use, turnkey solution that streamlines Cisco Collaboration administration…

71
IDcentral
0 reviews

IDcentral is a digital identity platform, that aims to help businesses across various domains to increase their profitability and reduce risk. IDcentral’s solutions include:• Onboarding• Risk Detection with the help of alternate credit score and other risk metrics• Buying propensity…

72
SecZetta
0 reviews

SecZetta, headquartered in Fall River, is an identity risk and IAM software solution provider that offers tools that enable organizations to execute risk-based identity access and lifecycle strategies for vendors, partners, contractors, freelancers, bots, service accounts, and other…

73
Hideez
0 reviews

Hideez provides identity and access management solutions for business and personal use. The flagship product, Hideez Key, is presented as a compact, wareable, all-in-one Bluetooth-enabled hardware key that serves as a secure password manager, proximity lock/unlock for PCs, and electronic…

74
Spoko
0 reviews

Spoko Cloud Manager, from Cogniflare in London, is presented as a lightweight and user-friendly Identity and Access Management (IDAM) solution for large enterprises, which allows users to take control of your Google Cloud infrastructure and simplify access management. According…

75
ProID Multifactor

ProID Multifactor are tools and methods for workforce identity authentication (2FA, MFA) and simple login to computers, clouds or applications. This is accompanied by a number of modules for certificate lifecycle management in MS Windows, iOS, or Linux. The vendor describes the…

Videos for Identity Management Solutions

The Evolution Of IAM (Identity Access Management)
03:07
We take a look at its history and evolution; from the origins of the first computer passwords in the 1960s to congressional oversight in the 21st century like the Sarbanes-Oxley Act.

Identity Management Solutions TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Learn More About Identity Management Solutions

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems)
  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server)
  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)
  • Password management and self-help for password users
  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access)
  • Directory / User Repository Management for tracking of users with access
  • Security Analytics for auditing and compliance

Challenges from Distributed Identity-Based Systems

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

The latest solution to managing distributed identity-based systems is Identity-as-a-Service (IDaaS). IDaaS is a cloud-based service offered by identity management vendors that outsources identity management to the vendor, especially in regards to access management for SaaS applications. In most cases, employees and other end users utilize Single Sign-On to access all of their business systems and applications. The vendor handles all of the identity management and authorization protocols on behalf of the business, saving the organization maintenance and overhead costs in the process.

Identity Centralization and Privileged Access Management

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Identity management solutions also enable businesses to utilize more granular privileged access management (PAM). Privileged access management ties users’ identities to specific privileges within different systems and applications. PAM capabilities limit the number of unnecessary access privileges that users have, minimizing the risk that comes with such excess privileges. Identity management software with PAM features, or standalone PAM products, also streamline privilege management for IT administrators, improving efficiency and security simultaneously.

Identity Management Solution Comparisons

There are some common factors to consider when comparing identity management solutions:

  1. Identity management suite vs. password management solution: Many identity management solutions started out as password management tools which then expanded into identity management. These products will likely excel at ease of use and integrations with popular 3rd party systems. In contrast, identity management suites with a legacy of identity management will likely be more robust for complex or large-scale identity management needs.
  2. User-focus vs. data security focus: same goals, but user-focus is more focused on making end-user’s identity management processes easier. In contrast, data security is more aligned with privileged access management, which prioritizes minimizing the attack surface of a business’s systems and data.
  3. SMB vs. Enterprise Users: Many identity management products skew towards either the SMB or the Enterprise markets. SMB-focused products will likely be easier to use with a greater focus on efficiency and self-service, while enterprise products will be more scalable and robust for IT administrators. Buyers can consider the distribution of reviews across SMB and enterprise reviews as a signpost of where a product may lie on this spectrum.

Start an identity management solution comparison

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Related Categories

Frequently Asked Questions

How does identity management software work?

Identity management software tracks users’ credentials and accounts in a central repository, enabling more centralization and security.

What’s the difference between identity management and privileged access management?

Identity management enables privileged access management by providing the system of record for user’s credentials and information. PAM then uses those credentials to assign specific privileges.

Does my business need identity management software?

A business should consider investing in identity management software if it leverages more than 1 or 2 protected systems with proprietary, sensitive, or business-critical data.

What are the benefits of an identity management system?

Identity management systems allow IT administrators to work more efficiently, saving time and money. They also improve business security, mitigating risks and potential breaches.

How much does identity management software cost?

Identity management software is most commonly priced per month, per user, up to $35/user/month for large deployments. Some vendors also offer specific features, like API access management or MFA, a la carte.