search Where Thought Leaders go for Growth

Identity & Access Management Software

IT Services & Software solutions are used in many aspects of a company, notably to control the flow of visitors. Identity & access management tools aim at securing access to infrastructures thanks to identity verification technologies.

Identity & Access Management : related categories

Our selection of 44 identity & access management software

HID Contrôle d'accès

Efficient Access Control Solution for Businesses

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Streamline access management with this SaaS software. Control who can enter your building and when, with ease.

chevron-right See more details See less details

This Identity & Access Management software offers a range of features, including time-based access control, visitor management, and audit trails. Keep your premises secure with this intuitive solution.

Read our analysis about HID Contrôle d'accès
Learn more

To HID Contrôle d'accès product page

IAM

Innovative Identity Management Solution for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Streamline user access and security with advanced IAM software that secures sensitive data and simplifies identity management.

chevron-right See more details See less details

IAM provides a comprehensive solution for managing user access across multiple platforms, applications and devices. With advanced security features such as multi-factor authentication and role-based access control, IAM ensures that only authorized users have access to sensitive data.

Read our analysis about IAM
Learn more

To IAM product page

IBM cloud identity

Efficient Identity Management for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Securely manage user identities and access to applications and data with this cloud-based IAM solution.

chevron-right See more details See less details

IBM cloud identity offers a comprehensive set of features, including single sign-on, multi-factor authentication, and access control policies. The software allows for easy integration with existing systems and provides a user-friendly interface for managing identities and access.

Read our analysis about IBM cloud identity
Learn more

To IBM cloud identity product page

Azure Active Directory

Seamlessly Manage Identity with Cloud Directory

star star star star star-half-outlined
4.8
Based on 150 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Securely manage user identities and access to resources with this cloud-based software.

chevron-right See more details See less details

Azure Active Directory offers a comprehensive set of identity and access management solutions, including single sign-on, multi-factor authentication, and self-service password reset. It integrates seamlessly with other Microsoft services and provides granular control over user permissions and access to applications and data.

Read our analysis about Azure Active Directory
Learn more

To Azure Active Directory product page

I-am

AI-Powered Project Management for Seamless Collaboration

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Simplify your access management with our software. Secure your data and control user access with ease.

chevron-right See more details See less details

Our Identity and Access Management software provides a user-friendly interface for efficient access management. With our software, you can easily manage user permissions, monitor user activity, and protect sensitive information with advanced security features.

Read our analysis about I-am
Learn more

To I-am product page

SemSenha

Effortless Passwordless Access for Enhanced Productivity

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Securely manage user access to your systems and data with our Identity & Access Management software.

chevron-right See more details See less details

SemSenha offers a comprehensive solution for managing user access, including single sign-on, multi-factor authentication, and role-based access control. Our software allows you to easily manage user permissions and ensure compliance with security regulations.

Read our analysis about SemSenha
Learn more

To SemSenha product page

Mati

Streamlined Identity Verification for Modern Businesses

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Streamline your identity and access management with this software. Features include secure authentication, role-based access control, and single sign-on.

chevron-right See more details See less details

Manage user access across all your applications with ease. The software offers multi-factor authentication, granular access control, and customisable workflows. Plus, it integrates with popular SaaS platforms.

Read our analysis about Mati
Learn more

To Mati product page

Apache Syncope

Efficient Identity Management for Enterprises

star star star star star-half-outlined
4.6
Based on 5 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Simplify access management and improve security with this SaaS solution. Control user access to resources, automate workflows and monitor activities with ease.

chevron-right See more details See less details

This Identity & Access Management software streamlines user access by providing a centralized platform to manage authentication and authorisation. With advanced features such as role-based access control and user provisioning, you can ensure secure access to company resources.

Read our analysis about Apache Syncope
Learn more

To Apache Syncope product page

Ignimission Protec

Workforce Compliance Management Made Easy

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Securely manage user access & protect sensitive data with our IAM software.

chevron-right See more details See less details

Ignimission Protec offers a comprehensive solution for managing user identities and access to resources. With features like multi-factor authentication, role-based access control, and activity monitoring, you can ensure that only authorized users have access to your sensitive data.

Read our analysis about Ignimission Protec
Learn more

To Ignimission Protec product page

LuxTrust

Securing Your Digital Life

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Securely manage and authenticate digital identities and transactions with cutting-edge technology.

chevron-right See more details See less details

LuxTrust provides an advanced SaaS solution for managing and verifying digital identities and transactions with top-notch security protocols. Its user-friendly interface seamlessly integrates into existing systems, simplifying workflows and increasing efficiency.

Read our analysis about LuxTrust
Learn more

To LuxTrust product page

AD360

Streamline Business Processes with Advanced Solutions

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Manage user identities and access with ease using this software. Customizable workflows, compliance reporting, and single sign-on are just some of its features.

chevron-right See more details See less details

AD360 provides a comprehensive solution for Identity & Access Management. Its role-based access control ensures only authorized users have access to resources. The software offers multi-factor authentication, password management, and audit trails to enhance security. AD360 integrates with Active Directory, LDAP, and other authentication systems.

Read our analysis about AD360
Learn more

To AD360 product page

miniOrange

Boost Authentication with Identity Management Tools

star star star star star-half-outlined
4.6
Based on 193 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
check-circle Free version
check-circle Free trial
check-circle Free demo

Paid version from US$49.00 /month

miniOrange is a powerful identity management software designed for businesses of all sizes.

chevron-right See more details See less details

It enhances security and compliance with two-factor authentication (2FA) and single sign-on (SSO) capabilities, setting it apart with its ease of integration and robust support for multiple platforms.

Read our analysis about miniOrange
Learn more

To miniOrange product page

Entrust

Streamlined Document Solutions for Professionals

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Entrust is a powerful digital tool designed for professionals seeking efficient document management solutions.

chevron-right See more details See less details

Ideal for businesses of all sizes, it offers features like automated workflows, real-time collaboration, and extensive analytics, setting it apart in the competitive landscape of document management software.

Read our analysis about Entrust
Learn more

To Entrust product page

Jumio

Innovative Identity Verification Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Jumio is a cutting-edge identity verification software designed for businesses seeking streamlined customer onboarding and fraud prevention.

chevron-right See more details See less details

Ideal for financial institutions, healthcare, and e-commerce, Jumio combines AI and biometric technology to deliver fast, secure, and reliable identity solutions.

Read our analysis about Jumio
Learn more

To Jumio product page

Veriff

Advanced Identity Verification Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Veriff is a comprehensive identity verification software designed for businesses requiring robust and reliable identity checks.

chevron-right See more details See less details

It delivers top-notch features like industry-leading verification speed, comprehensive fraud prevention, and a seamless integration process. Ideal for industries including finance, travel, and e-commerce.

Read our analysis about Veriff
Learn more

To Veriff product page

Cloud-IAM

Effortlessly IAM management with Keycloak

No user review
check-circle Free version
check-circle Free trial
close-circle Free demo

Pricing on request

Cloud-IAM is a specialized platform for deploying, managing, and scaling Keycloak-based identity and access management (IAM) solutions.

chevron-right See more details See less details

Designed for developers and companies that require robust and compliant IAM systems, Cloud-IAM streamlines the setup and operation of Keycloak clusters across multiple cloud providers.

Read our analysis about Cloud-IAM
Learn more

To Cloud-IAM product page

Jumpcloud

Unified Identity and Device Management Platform

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

JumpCloud is an open directory platform designed to unify identity, access, and device management across various operating systems.

chevron-right See more details See less details

Trusted by over 200,000 organizations globally, JumpCloud provides a cost-effective solution without sacrificing security or functionality, simplifying IT management and securing hybrid work environments.

Read our analysis about Jumpcloud
Learn more

To Jumpcloud product page

ShareID

Real-Time Authentication with Official Identity

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

ShareID offers a smart identity verification solution that enables businesses to authenticate users in real-time using reusable digital identities.

chevron-right See more details See less details

By leveraging AI, ShareID enhances user experience and ensures secure, seamless verification. Key Features of ShareID Conversion Success: Achieve a 92% success rate on the first attempt, thanks to AI-powered user assistance.

Read our analysis about ShareID
Learn more

To ShareID product page

AssureID

Tailored Identity Verification Software for Businesses

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Securely manage user identities and access with powerful software that streamlines operations and reduces risk.

chevron-right See more details See less details

AssureID's Identity & Access Management software offers advanced features such as multi-factor authentication, role-based access control, and audit trails, ensuring compliance and reducing the risk of data breaches. With a user-friendly interface and customizable workflows, it simplifies identity management for businesses of all sizes.

Read our analysis about AssureID
Learn more

To AssureID product page

Hopae

Building the Future of Identity

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Next-gen identity technology that transforms the way you verify yourself on the web into a magical experience.

chevron-right See more details See less details

Hopae offers privacy-preserving, secure, and trusted solutions for safeguarding individual identities in the digital world. Key Benefits Privacy Preserving Our technology ensures that your personal information remains private and secure, enabling safe data sharing without compromising privacy.

Read our analysis about Hopae
Learn more

To Hopae product page

Identity & Access Management software: purchase guide

What is an Online Identity & Access Management Solution?

Definition

To reinforce internal data protection, companies use Identity & Access Management Systems (IAM). Security is the main objective of IAM software. These are programmes designed to automate access control and thus gain time compared to traditional methods.

How does it work?

IAM solutions now offer SaaS solutions. Thanks to this innovation, external agent authorizations can be managed online. There is no need to download and install the software on local servers, which risks raising maintenance costs. Most of these tools are hosted in the cloud. This operating method reduces the risk of internal data being hacked, while also allowing for real-time movement tracking. Surveillance missions can even be done remotely, as long as internet access is available.

Since these tools live online, the company has to subscribe to a plan. This step grants access to a private administration platform which managers can use simultaneously to accomplish their assigned tasks.

What are the main features of a SaaS IAM solution?

The specific modules that make up IAM software can vary. However, basic functionalities are usually the same with any software:

Administrator account creation

It is important for programmes to have pilots. This is also the case for IAM solutions. Thanks to administrator account creation, companies can choose which agent is in charge of validating or denying access requests. For companies with managing directors, the latter can set up access policies and restrictions directly for the staff they manage. 

HR data integration

Usually, this type of solution offers an option allowing system administrators to link HR data to the access management system. This method makes it easier to categorise visitors and staff members. It is even possible to set up automatic restrictions and authorizations based on seniority level and the job titles of employees.

Tracking system

Reinforcing the security of the data stored within the system is the main goal of these solutions. Editors of this type of software provide tracking systems, which allow companies to track the movements of employees. Of course, these options must comply with norms related to the disclosure of confidential corporate data, and companies must respect the privacy of employees.

Who are IAM solutions for?

These solutions can be used by all companies, regardless of their size. Access management being of paramount importance, it is recommended that consulting firms of more than 5 people to set up a unique authentication system. It should be noted that these software are also designed to be used by independents who collaborate closely with third parties. In this case, secure remote data access is required.

Why use an IAM solution?

These software have pros and cons. Below are some important issues to consider before signing up to these SaaS solutions:

Advantages

  • The security manager can create as many visitor profiles as they want
  • They can set up personalised restrictions for different kinds of profiles
  • It is possible to share data related to visitor management to supervisors
  • It is possible to automate access control with presets
  • Relevant staff can access clear statistics related to access management
  • It is easier to create many user sessions

Inconvénients

Free access management software offer only limited functionality and basic services.

How to choose the best IAM solution?

Choosing an access management software depends on a few criteria. Before taking your decision, you should consider the following points:

  • The quality of the UI: an identity management tool must have an easy-to-use interface. The layout of the different menus are essential to these solutions. An ergonomic UI is indispensable. 
  • The feature set: basic functionalities are always included. However, software editors also offer customizable modules. These should be studied carefully: they have been designed to provide companies with tailor-made solutions. 
  • Customer support: a reliable software editor should be able to provide 24/7 support. This criteria is important, as if you encounter a problem or have a question, they can only be solved by qualified people. In most cases, subscription fees include online, phone or email assistance.
  • Cost flexibility: this type of software are sold at different prices depending to the size of your company. Costs can also be reduced by choosing a long-term engagement. You should make sure there are no hidden costs, which could impact the original budget.

The Best IAM solutions

Identity & Access Management softwares: Q&A

How does identity & access management software work?

chevron-right

Identity & access management software works by managing user identity and access to different systems and applications within an organisation. It provides a centralised platform to manage user accounts, passwords, and permissions. Users can access different applications based on their roles and permissions, while administrators can monitor and control access to sensitive data.

What features should I look for when looking for identity & access management software?

chevron-right

When looking for identity & access management software, look for features such as single sign-on, multi-factor authentication, password management, role-based access control, and auditing and reporting capabilities. These features help improve security and simplify user management, making it easier to comply with regulatory requirements.

What are the benefits of identity & access management for my company?

chevron-right

Identity & access management provides several benefits for companies, such as improved security, reduced risk of data breaches, simplified user management, increased productivity, and compliance with regulatory requirements. It also helps to prevent unauthorised access to sensitive data, which can result in costly legal and reputational consequences.

What are the best identity & access management software options?

chevron-right

Some of the best identity & access management software options in the UK market include Okta, Microsoft Azure Active Directory, Ping Identity, and OneLogin. These software solutions offer a range of features and integrations, making them suitable for businesses of different sizes and industries.

What are the free identity & access management software alternatives I could try?

chevron-right

There are several free identity & access management software alternatives you could try, such as OpenIAM, Keycloak, and Gluu. These solutions offer basic features such as user management, single sign-on, and multi-factor authentication. However, they may not offer the same level of functionality and support as paid solutions.