Best Identity Management Software83Identity Management (IdM) is essentially about creating, maintaining, and retiring individual enterprise accounts for IT security. Identity and Access Management (IAM) systems encompass this but also provide a framework that goes beyond digital identities to providing access to users in various roles in a relatively automated fashion for cost and efficiency, while yet presenting minimal risk to sensitive data or equipment, simultaneously creating an audit trail for lawful compliance. Depending on the implementation needed by the enterprise (i.e. who is logging in and to what largely determines this) these concerns can be somewhat, highly, or totally overlapping areas. Making comparisons across suites of software and their vendors can be difficult as this apparently singular body of needs is serviced by vendors in this area in a highly modular fashion who bridge gaps with strategic or technical partnerships and integrations. But here "Identity Management" Software is defined as software which handles all or some of the tasks related to all of the above, which may be divided into: -- Identity governance or provisioning (basically role management with workflow controls). -- Access (authorization or restriction of access to certain information to certain persons across locations and systems). ...and the various methods of enabling rapid yet secure access like: -- Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without need for logging in again via help from a server). -- Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security, though at a cost of efficiency for each additional step). -- Password management and self-help for password users. -- Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access). -- Directory / User Repository Management for tracking of users with access, and -- Security Analytics for auditing and compliance... ...and more. IAM software is most usually sold in a modular, configurable pieces-sold-separately fashion, where each module handles some but not all of these needs. Some of the strongest vendors in this area offer high specialization and strategic partnerships with other specializers while other established vendors, via both acquisitions and development, manage to cobble together comprehensive portfolios and subsume all the various needs under one grand suite of comprehensive IAM capabilities. Enterprises have gone both ways. A later arriving area of identity management software that greatly up-prioritizes speed and ease of access over security is called by the vendors who specialize in it Customer Identity Management, which provides simple customer registration most often via Social Sign-On capability. This allows a user to instantaneously set up an account with a service provider merely by logging in via their preferred social network account; voila, the customer has (safe, limited) access, and the enterprise gains useful information about the potential customer in less than five seconds. While traditional Identity Management Systems offer the capability to do this, smaller vendors who specialize in customer access, with its high-efficiency / low-security demands, sometimes bundle the feature with other common marketing capabilities to leverage the instantly acquired customer data (e.g. email marketing, segmentation, landing pages, etc.), thus creating a (growing) niche of customer-facing identity management systems in the process.Portadi1https://media.trustradius.com/product-logos/3G/4W/S8F048AWOHI8.pngAraxid2https://media.trustradius.com/product-logos/2T/R3/CNWPZKUM7FPC.pngNetIQ Access Governance Suite3https://media.trustradius.com/vendor-logos/Zm/IY/D5DAJSH3LPPI-180x180.GIFIBM Cloud Identity Services4https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGExostar5https://media.trustradius.com/product-logos/Tt/Jx/4X3K9CLZKHV8.jpegTools4ever UMRA6https://media.trustradius.com/product-logos/E8/Mb/20L6ALJHDJTP.jpegConjur7https://media.trustradius.com/vendor-logos/Zq/xO/OFRI13T14IB9-180x180.JPEGOpenAthens Managed Directory8https://media.trustradius.com/product-logos/ZX/Dv/1EU9LOXLTT3U.JPEGApprova Continuous Monitoring9https://media.trustradius.com/vendor-logos/qg/yE/TTWOKM9V0PAB-180x180.JPEGLayer7 Privileged Access Management (formerly CA Privileged Access Management)10https://media.trustradius.com/vendor-logos/XC/qb/OEOG2461M9II-180x180.JPEGSign&go11https://media.trustradius.com/product-logos/te/9e/AECLFP47DKRR.pngIBM Security Identity Governance12https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGHoracius13https://media.trustradius.com/product-logos/h1/YN/TTIHG5MS9715.jpegWhiteOPS14https://media.trustradius.com/product-logos/He/xP/LUNDC4DAP386.jpegbi-Cube15https://media.trustradius.com/product-logos/B5/pg/ECR08NN774GH.jpegIDM36516https://media.trustradius.com/product-logos/fr/gP/ALA48SMQT1BV.JPEGIdentityNow17https://media.trustradius.com/vendor-logos/dq/Gy/OW0I6JENK03Z-180x180.JPEGCSID18https://media.trustradius.com/product-logos/Jk/wY/VPGMCPJG1X9E.PNGCentrify Zero Trust Privilege Services19https://media.trustradius.com/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEGActiveRoles Server20https://media.trustradius.com/vendor-logos/12/fY/5HC8NTA1P3NF-180x180.PNGXpress Password21https://media.trustradius.com/product-logos/ZM/HR/1578ZR0BTA8J.PNGAccess Auditor22https://media.trustradius.com/product-logos/dU/yY/HMCF694NWLAX.pngTeamsID23https://media.trustradius.com/product-logos/7G/g5/OLP46RANCAFJ.PNGThisData24https://media.trustradius.com/product-logos/Y8/0B/SA2F66R24QIL.PNGSocure25https://media.trustradius.com/product-logos/fP/Cm/3W7NLWGER4IT.PNG

Identity Management Software

Best Identity Management Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Software Overview

What is Identity Management Software?

Identity management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity management software is to improve security and employee productivity. It should also lower costs while managing user identities and credentials.

Identity Management Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

The IT Environment

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes compliance especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

How Identity Management Software Helps

Identity management tools make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. The tools also supply self-service capabilities for end users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

Listings (76-100 of 119)

We don't have enough ratings and reviews to provide an overall score.

Portadi, headquartered in Santa Clara, California, offers a cloud access panel for business applications, a single sign-on solution.

We don't have enough ratings and reviews to provide an overall score.

Araxid from the company of the same name in McLean, Virginia is an identity and access management platform.

We don't have enough ratings and reviews to provide an overall score.

The NetIQ Access Governance Suite is a set of enterprise-level identity and access management (IAM) tools from NetIQ, the Houston based company and brand formerly of the Attachmate Group which has merged with Micro Focus Group since November 2014 (LSE:MCRO, revenue $433.1 million), providing user...

We don't have enough ratings and reviews to provide an overall score.

Exostar presents a modular, configurable, scalable suite of enterprise-grade identity credentialing and access management products for enterprises, with particular attention to those with high security requirements (Aerospace, Defense, etc.).

We don't have enough ratings and reviews to provide an overall score.

New York software company Tools4ever offers a suite of identity management and access (IAM/IdM) tools, for single sign-on (SSO), password management, access control and authorization, and more, with the User Management Resource Administrator, or UMRA.

We don't have enough ratings and reviews to provide an overall score.

Conjur's security services and applications are now owned and supported by CyberArk since the 2017 acquisition.

We don't have enough ratings and reviews to provide an overall score.

OpenAthens MD is a completely hosted solution that is designed to enable organisations to securely and effectively manage their users’ access to web-based resources, and allow access to services outside or within federations such as the UK Access Management Federation and OpenAthens Federation.

We don't have enough ratings and reviews to provide an overall score.

Layer7 Privileged Access Management (formerly CA Privileged Access Management) is an identity and access management offering, from Broadcom company CA Technologies. It is designed to prevent security breaches by providing granular authorization of users to systems and accounts, constantly monitor...

We don't have enough ratings and reviews to provide an overall score.

Sign&go from Ilex International headquartered in France is a single sign-on (SSO) and identity management option.

We don't have enough ratings and reviews to provide an overall score.

Horacius is an identity and access management option from Brazilian company e-trust.

We don't have enough ratings and reviews to provide an overall score.

WhiteOPS, from Israeli company Whitebox Security, is an identity management solution.

We don't have enough ratings and reviews to provide an overall score.

bi-Cube from iSM Secu-Sys in Germany is an identity management and user provisioning option.

We don't have enough ratings and reviews to provide an overall score.

IDM365 is a hybrid between RBAC and ABAC and is a unique identity and access management solution that is designed to make managing systems and governing users simple and cost-effective. To do this, automated tools are used to clean up and organize existing users and roles before taking over the t...

We don't have enough ratings and reviews to provide an overall score.

IdentityNow is a cloud-based identity and access management (IAM) solution with single sign-on (SSO), from Sailpoint headquartered in Austin, Texas, featuring provisioning and access control.

We don't have enough ratings and reviews to provide an overall score.

CSID (formerly called CSIdentity) is identity protection and fraud detection software. The CSID platform includes data breach mitigation, social media monitoring, financial account takeover, credit data, enterprise threat intelligence, and other features and services. CSID was recently acquired b...

We don't have enough ratings and reviews to provide an overall score.

IDaaS Password Next from ILANTUS Technologies in Schaumberg is a password management and password synchronization tool that provides users a reduced sign on experience along with advanced password self-service capabilities from any device, touting integration with a wide range of enterprise appli...

We don't have enough ratings and reviews to provide an overall score.

TeamsID from SplashData offers a cloud solution and native apps to manage passwords on mobile devices and desktop systems (iOS, Android, Windows, and Mac). The product also has a Chrome browser extension.

We don't have enough ratings and reviews to provide an overall score.

ThisData offers real-time detection of Account Takeover (ATO) attacks for web and mobile applications. ThisData provides users with total visibility with zero configuration required. How ThisData works: • Real-time detection of account takeover via analysis contextual user information.• Use of m...

We don't have enough ratings and reviews to provide an overall score.

Socure is an AI-powered identity verification system designed to help financial services companies prevent identity fraud losses and remain compliant. The system is comprised of ID+, the identity verification mechanism, a KYC (Know Your Customers) Compliance add-on, which uses additional personal...