G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
With GPOADmin, you can automate critical GPO management tasks and reduce your costs while eliminating time-intensive manual processes. Quickly and effectively administer changes to GPOs to support cha
HORACIUS is a comprehensive IAM system providing features such as HR systems integration, segregation of duties, incident management, IAM security event correlation and an integrated incident manageme
Streamline Security Management with IG Security Tracker™ for TeamConnect™ IG Security Tracker™ is an innovative solution made for TeamConnect, designed to enhance security and compliance management.
Infisign is a pioneering Identity and Access Management (IAM) platform that empowers organizations to securely manage digital and customer identities (CIAM) across diverse environments. By leveraging
Nervepoint Access Manager is a complete self-service password rest and account unlock tool. It empowers end users to manage their accounts by synchronize across on-premise and cloud systems. It encomp
NetIQ Group Policy Administrator is a centralized management tool that allows you to edit, test, review and compare GPO changes before implementing them in your live environment.
Radiant Logic, the enterprise Identity Data Fabric company, provides the cornerstone of complex identity architectures in today’s digital world. With Radiant, it’s fast and easy to put identity data t
RapidScale's Microsoft 365 plans to fit organizational needs with the office tools companies use every day, implemented and supported by cloud services and co-management gurus - all with complimentary
Scalekit simplifies authentication for B2B SaaS teams. Add enterprise auth features like SSO, SCIM provisioning, and Social Logins in just days. Built with a multi-tenant architecture at its core, Sca
Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work
DirectAxs provides a suite of services to meet all of your identity, access, risk management, and governance needs. Either as an on-site process or via our best-of-breed cloud-based systems.
AD Console gives a simplified platform for managing the Active Directory. The software enlists all the users within the software interface and provides option to create, delete, and rename the users w
A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri
Access Control Plus takes a team-based approach to enabling project administrators to easily manage the complexity of complete and proper authentication (AuthN) and authorization (AuthZ) configuration
Account Genious is a identity management software that provides user account management, role-based access control, sensitive data encryption, and report generation.
Adaptive Security Manager is an Intelligent, affordable, adaptive multi-factor security for web applications.
AD Health Profiler can do health check of production Active Directory Forests. A complete health check indeed is needed before implementing new solutions to your customers and/or before making a big c
Built to streamline Cisco Collaboration administration, Akkadian Provisioning Manager automates provisioning across multiple UC servers and applications. But, the solution is so much more than moves,
Alex is Twine's first AI Digital Employee - a cybersecurity expert in Identity and Access Management (IAM). Alex learns, understands and takes away the burden of IAM tasks - proactively completing you
Automate account aggregation without manually handling files
Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/
Arnica UnifiedLogon is an identity management software that provides access control, personalization and configuration services, and allows users to implement single-point user log-on for access to mu
Aserto helps developers build secure applications. It makes it easy to add fine-grained, policy-based, real-time access control to applications and APIs.Aserto handles all the heavy lifting required t
BastionZero is a Zero Trust access platform for infrastructure, offering passwordless access to various resources like servers and Kubernetes, paired with Identity Providers (IdP) for policy-based acc
BCC Affirmatic is your unified point of access for all Microsoft 365 resources to provide precise Lifecycle Management and Governance, deployable on public or private cloud. By specialising in Guest U
Beacon by Orchestry is an all-in-one solution for Microsoft Partners and Managed Service Providers (MSPs), designed to enhance multi-tenant management, performance, and insights across Microsoft 365 (
Identity Management Managing user accounts in multiple applications is not an easy matter.
Deep Data Governance Manager (Deep DGM) provides complete automation for identity, data access governance and lifecycle management with the integration between other modules such as Deep IACM and Deep
Directory Update enable users to update their own information in Active Directory, the Exchange Global Address List, and Microsoft 365 as well as manage distribution list group membership using an ea
DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution u
Quickly document user and/or group NTFS effective and share permissions. Discover file ownership throughout your shared disk space. Report on users, groups, computers, permissions. Make sure your Ac
FirstWare DynamicGroup is an AD automation tool. It provides automated group assignments of AD objects. Real time savings and higher security through group memberships which are always up-to-date.
e2mod delivers identity management and administration of On Premises AD and EntraID via a web interface and via a Zero Trust archivtecture. With currently more than 160,000 users we are the choice of
With Evidian Enterprise SSO access will be more quickly and securely available. Settings are managed and applied automatically. Evidian Identity & Access Manager will bring real changes to the dai
Manage identities accuretly, efficiently and confidentialy
Fastman Permissions Manager simplifies permissions management and strengthens data security for OpenText™ and SAP Extended ECM. Designed for efficiency, it empowers administrators to manage complex ac
Fastman Time-Based Access simplifies granting temporary permissions in OpenText™ and SAP Extended ECM. It allows content owners to assign specific access levels for a defined period, ensuring secure c
Risk & Liquidity is a modular solution system, containing calculation engines, processes, interfaces, accounting templates and much more for numerous kinds of tasks.
Fischer Identity is a leading developer of enterprise Identity and Access Management (IAM) solutions based on the Zero Trust model. Our products simplify, accelerate and automate the complex task of I
Garancy is a comprehensive Identity Access Management (IAM) software solution designed to help organizations manage and secure access to their data and applications. It provides a robust framework for
Govern 365 is the ultimate solution for secure collaboration, virtual data rooms, and compliance in Microsoft 365. Book a demo today to learn more
Hyena is software that helps administrators manage a medium to large Windows 200x network or Active Directory environment.
Now that it's clear why IAMCompare was built, let's review how it works.
IBM Security Verify Governance, formerly IBM Security Identity Governance and Intelligence (IGI), delivers a business-centric approach to enterprise identity management and governance. It empowers bus
Idax — Modern Identity Governance: Idax delivers AI-powered, Identity Governance and Administration (IGA) software that’s clear, quick and practical—ideal for organisations that need results without
Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous
SecurEnds provides a cloud born Identity Governance solution that allows organizations to secure identities, protect against potential breaches, and meet security compliance. Using SecurEnds' platform
Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access.
Keeper’s patented PAM platform enables organizations to achieve complete visibility, security, control and reporting across every user on every device. KeeperPAM is cloud-based, enables zero-trust and
Linx Security is a modern identity governance and security platform purpose-built for modern enterprises.
LTS Secure Identity Management allows you to comprehensively and securely manage the complete identity life cycle of users, devices, and things. From identity to device registration, provisioning, syn
This extension for Magento 2 allows businesses to manage multiple sub-accounts under a single customer account, with flexible permission settings for each user. Designed for B2B needs, it supports str
Have a private or wholesale store? Want only registered customers browse your catalog, see prices, and place orders? Hide the entire store behind the login form using the Store Login Access extension
MonoSign is a comprehensive Identity & Access Management solution for enterprise level companies. Get Universal Directory, Single Sign-On, Adaptive MFA, Lifecycle Management and many more...
NTFS permission tool to get effective security of data on system through permissions for files and folders.
Omega Core Audit is an out-of-box, software-only security solution for the security compliance of Oracle database. It features Access Control, Continuous Audit Monitoring and Real-Time Protection, thu
Provisioning Engine to Multiple Cloud Applications for easy Identity Management.
Ory Network protects your user data and provides secure access for cloud applications at any scale. Innovate with the world's leading open source, low latency, zero trust security infrastructure for i
PeoplePlatform helps create, update, and deprovision users and other objects in any directory.
Permeasyon is a turnkey solution that reduces the time needed to set up permissions, using an easy, fast and secure system to add, remove and relocate users and resources of all the applications in yo
Full Stack Permissions as a Service. Permit.io empowers developers to bake in permissions and access-control into any product in minutes and takes away the pain of constantly rebuilding them.
Phonism is a cloud solution that provides easy to use tools to manage VoIP phones before, during and after deployment.
As an advanced behavior-based monitoring and analysis solution, Appsian Security enables organizations to easily organize, understand, and control employee authorizations across multiple ERP systems.
Pyla simplifies IT Onboarding and Offboarding processes It centralizes and automates the allocation of employee access and permissions in one platform, allowing optimal management of employee profiles
Active Administrator is a complete and integrated Microsoft Active Directory (AD) management software solution that fills the administration gaps native tools leave behind. With Active Administrator,
OKIOK has been developping and delivering world class cybersecurity solutions and services since 1981. RAC/M Identity stands out as an advanced SaaS Identity Governance and Administration (IGA) solu
SAASPASS is your key to the world. By providing a comprehensive and frictionless solution fully-secured with dynamic passcodes and multi-factor authentication, SAASPASS is the only identity and access
SafePaaS is a leading global provider of cybersecurity and risk management solutions that help organizations efficiently monitor internal controls, intelligently manage risks, and optimally execute bu
Sentri is a robust security platform, which is a perfect blend of information, technology and infrastructure.
See beyond the event horizon and gain full visibility into all your critical user access data. Automate your access review process, manage access related risk events, and stay on top of your data, all
Sysgem Enterprise Manager enables organizations of any size to efficiently unite, simplify and integrate critical systems, user account and security management functionalities across their multi-platf
tenfold is a no-code solution for Identity Governance & Administration (IGA), ensuring that the right people have access to the right resources at the right time. Thanks to its off-the-shelf plugi
THEFENCE™ is an automated, modularly built, AI-powered, lightweight identity governance and administration (IGA) platform tailored to enhance identity security and access governance for organizations
The Tieto Usermanagement helps you to automate the tiresome task to create, modify and delete user accounts within genesys. It manages both administration and agent accounts and it adds the users to t
Tricent is the #1 file-sharing governance SaaS platform that helps organizations make their file-sharing more secure and compliant without sacrificing collaboration. Tricent enables more secure and
Vault One makes your company safer & smarter, Password and Access management security for applications, websites, cloud services, and infrastructure.
Youzer is an online software for managing and monitoring IT and SaaS accounts that helps companies assign relevant tools to their employees and control the use of SaaS applications within their IT sys
Zoho Directory (ZD) is the workforce identity and access management solution for your business. ZD is a security product from Zoho that manages user identities, apps, and devices in a single space. I