Identity Management Solutions

Top Rated Identity Management Products

These products won a Top Rated award for having excellent customer satisfaction ratings. The list is based purely on reviews; there is no paid placement, and analyst opinions do not influence the rankings. Read more about the Top Rated criteria.

Identity Management Solutions TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Identity Management Solutions Overview

What are Identity Management Solutions?

Identity and access management software manages information about the identity of software users and controls access to corporate resources. The overall goal of identity and access management software is to improve security and employee productivity. Identity management solutions should also lower costs while managing user identities and credentials.

Identity Management Solutions Features & Capabilities

  • Access (authorization or restriction of access to certain information to certain persons across locations and systems).

  • Single sign-on (SSO, describes the ability to login to the system once and only once, gaining access to all systems without the need for logging in again via help from a server).

  • Multi-factor authentication (using multiple, independent components to gain access, a simple step to increase security)

  • Password management and self-help for password users.

  • Identity federation, related to SSO, access spanning system boundaries (e.g. cloud access).

  • Directory / User Repository Management for tracking of users with access, and

  • Security Analytics for auditing and compliance...

Challenges from Distributed Identity-Based Systems

The modern IT environment is highly complex with large numbers of users accessing a tangle of on-premise and cloud applications. This makes identity and access management especially difficult. Each application essentially has its own proprietary identity store. Consequently, there is no directory federation, which burdens users with having to remember multiple logins. It burdens IT administrators with having to manage multiple different tools, procedures, and policies to manage user identities.

The latest solution to managing distributed identity-based systems is Identity-as-a-Service (IDaaS). IDaaS is a cloud-based service offered by identity management vendors that outsources identity management to the vendor, especially in regards to access management for SaaS applications. In most cases, employees and other end users utilize Single Sign-On to access all of their business systems and applications. The vendor handles all of the identity management and authorization protocols on behalf of the business, saving the organization maintenance and overhead costs in the process.

Identity Centralization and Privileged Access Management

Identity management solutions make it much easier to manage provisioning while ensuring compliance. In other words, providing and revoking access to applications in accordance with policies. Identity and access management software also supplies self-service capabilities for end-users, so that they can get the application access they need with no delays. They can also be automatically de-provisioned on the day they leave.

Identity management solutions also enable businesses to utilize more granular privileged access management (PAM). Privileged access management ties users’ identities to specific privileges within different systems and applications. PAM capabilities limit the number of unnecessary access privileges that users have, minimizing the risk that comes with such excess privileges. Identity management software with PAM features, or standalone PAM products, also streamline privilege management for IT administrators, improving efficiency and security simultaneously.

Identity Management Solution Comparisons

There are some common factors to consider when comparing identity management solutions:
  1. Identity management suite vs. password management solution: Many identity management solutions started out as password management tools which then expanded into identity management. These products will likely excel at ease of use and integrations with popular 3rd party systems. In contrast, identity management suites with a legacy of identity management will likely be more robust for complex or large-scale identity management needs.

  2. User-focus vs. data security focus: same goals, but user-focus is more focused on making end-user’s identity management processes easier. In contrast, data security is more aligned with privileged access management, which prioritizes minimizing the attack surface of a business’s systems and data.

  3. SMB vs. Enterprise Users: Many identity management products skew towards either the SMB or the Enterprise markets. SMB-focused products will likely be easier to use with a greater focus on efficiency and self-service, while enterprise products will be more scalable and robust for IT administrators. Buyers can consider the distribution of reviews across SMB and enterprise reviews as a signpost of where a product may lie on this spectrum.

Pricing Information

Identity Management software vendors usually price per month per user. Some vendors sell tiers of functionality with enterprise-level pricing which can be as much as $35 per user per month. Others provide unbundled pricing allowing customers to buy capabilities such as multi-factor authentication or API access management as individual capabilities for specific users.

Identity Management Products

(1-25 of 134) Sorted by Most Reviews

SafeNet Trusted Access

Gemalto, a Thales company since the April 2019 acquisition, provides a cloud-based identity-as-a-service (IaaS), user provisioning, and single sign-on (SSO) solution.


EmpowerID from the company of the same name in Ohio is an identity and access management (IAM) platform providing variable security, provisioning, SSO, and access solutions for global enterprises and companies of varying size and industries.


The eponymous ForgeRock Identity Management, from the company in San Francisco, automates the entire identity lifecycle, delivering it as a comprehensive and secure service managed from a central location. This approach to identity management enables users to collect the appropriate…

Ekran System

Ekran System® is a universal insider threat protection platform that promises to help business with employee monitoring, subcontractor control, PAM, and compliance tasks.Working with all levels of user privileges, Ekran System aims to help to track system configuration changes, critical…


Araxid from the company of the same name in McLean, Virginia is an identity and access management platform.

NetIQ Access Governance Suite

The NetIQ Access Governance Suite is a set of enterprise-level identity and access management (IAM) tools from NetIQ, the Houston based company and brand formerly of the Attachmate Group which has merged with Micro Focus Group since November 2014 (LSE:MCRO, revenue $433.1 million)…

IBM Security Verify (formerly IBM Cloud Identity)

IBM Security Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.


Portadi, headquartered in Santa Clara, California, offers a cloud access panel for business applications, a single sign-on solution.


Exostar presents a modular, configurable, scalable suite of enterprise-grade identity credentialing and access management products for enterprises, with particular attention to those with high security requirements (Aerospace, Defense, etc.).


WhiteOPS, from Israeli company Whitebox Security, is an identity management solution.


bi-Cube from iSM Secu-Sys in Germany is an identity management and user provisioning option.

Symantec Privileged Access Management (PAM), formerly Layer7 from CA

Symantec Privileged Access Management (formerly Layer7 from CA Privileged Access Management) is an identity and access management offering, from Broadcom. It is designed to prevent security breaches by providing granular authorization of users to systems and accounts, constantly…

Tools4ever UMRA

New York software company Tools4ever offers a suite of identity management and access (IAM/IdM) tools, for single sign-on (SSO), password management, access control and authorization, and more, with the User Management Resource Administrator, or UMRA.


Conjur's security services and applications are now owned and supported by CyberArk since the 2017 acquisition.


Horacius is an identity and access management option from Brazilian company e-trust.


IDM365 is a hybrid between RBAC and ABAC and is a unique identity and access management solution that is designed to make managing systems and governing users simple and cost-effective. To do this, automated tools are used to clean up and organize existing users and roles before…

OpenAthens Managed Directory

OpenAthens MD is a completely hosted solution that is designed to enable organisations to securely and effectively manage their users’ access to web-based resources, and allow access to services outside or within federations such as the UK Access Management Federation and OpenAthens…


Sign&go from Ilex International headquartered in France is a single sign-on (SSO) and identity management option.

IBM Security Identity Governance & Intelligence (IGI)

IBM Security Identity Governance & Intelligence (IGI) is designed to allow organizations to provision, audit and report on user access and activity through lifecycle, compliance and analytics capabilities. The solution is based on technology acquired with Roman company CrossIdeas…

ActiveRoles Server

ActiveRoles Server from Dell is an identity management and user provisioning option.

CSIdentity, now part of Experian Partner Solutions

CSIdentity, formerly from CSID and now part of Experian Partner Solutions (acquired in 2016) is identity protection and fraud detection software. The CSIdentity platform includes data breach mitigation, social media monitoring, financial account takeover, credit data, enterprise…

Centrify Zero Trust Privilege Services

Centrify aims to redefine Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure the modern enterprise. Centrify Zero Trust Privilege promises to help customers grant least privilege access based on verifying who is requesting access, the context of…


TeamsID from SplashData offers a cloud solution and native apps to manage passwords on mobile devices and desktop systems (iOS, Android, Windows, and Mac). The product also has a Chrome browser extension.


Socure is an AI-powered identity verification system designed to help financial services companies prevent identity fraud losses and remain compliant. The system is comprised of ID+, the identity verification mechanism, a KYC (Know Your Customers) Compliance add-on, which uses additional…

Xpress Password

IDaaS Password Next from ILANTUS Technologies in Schaumberg is a password management and password synchronization tool that provides users a reduced sign on experience along with advanced password self-service capabilities from any device, touting integration with a wide range of…

Frequently Asked Questions

How does identity management software work?

Identity management software tracks users’ credentials and accounts in a central repository, enabling more centralization and security.

What’s the difference between identity management and privileged access management?

Identity management enables privileged access management by providing the system of record for user’s credentials and information. PAM then uses those credentials to assign specific privileges.

Does my business need identity management software?

A business should consider investing in identity management software if it leverages more than 1 or 2 protected systems with proprietary, sensitive, or business-critical data.

What are the benefits of an identity management system?

Identity management systems allow IT administrators to work more efficiently, saving time and money. They also improve business security, mitigating risks and potential breaches.

How much does identity management software cost?

Identity management software is most commonly priced per month, per user, up to $35/user/month for large deployments. Some vendors also offer specific features, like API access management or MFA, a la carte.

What is IDaaS?

IDaaS is a cloud-based form of identity management where the vendor handles the infrastructure and authentication protocols that allow end users to access the business systems.