Best Customer Identity and Access Management (CIAM) Software for Splunk Cloud Platform

Find and compare the best Customer Identity and Access Management (CIAM) software for Splunk Cloud Platform in 2025

Use the comparison tool below to compare the top Customer Identity and Access Management (CIAM) software for Splunk Cloud Platform on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 2
    LoginRadius Reviews
    LoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication
  • 3
    Google Cloud Identity Reviews

    Google Cloud Identity

    Google

    $6 per user per month
    Unified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud.
  • 4
    Airlock Reviews
    Airlock's Secure Access Hub protects apps, APIs, and data from identity theft. Airlock combines security and convenience. It offers customers a seamless customer journey with single sign-on, social login, comprehensive user self service, consent management, and comprehensive user self-services. Reacting quickly is key to being in tune with the market. The Airlock Secure Access hub provides all necessary security functions, including registration, authentication, and self-services. You can focus all your IT resources on your business processes so you can use your IT resources more effectively. The Airlock Secure Access hub helps you meet all international compliance standards, including GDPR, PSD2, PCI–DSS and OWASP. The compliance of regulations is made easier by the inclusion of access policies onto applications and services.
  • 5
    Acceptto Zero Trust Identity (CIAM) Reviews
    It is important to verify that your customers are real. Customers don't want to have to prove their identity and they want you not to make them do it. You can protect your customers' identities by providing a delicate balance between security and a pleasant, frictionless customer experience. Continuous, real-time identity monitoring and validation after authorization. Intelligent MFA instantly eliminates account takeover (ATO). Continuous authentication orchestrated by risk-based policy Acceptto is a revolutionary cybersecurity company that views authentication as a continuous process, rather than a single event. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes user identity and infers behavioral data to detect anomalies. This eliminates dependence on vulnerable binary authentications. We offer the most robust, secure and hack-proof identity validation technology.
  • Previous
  • You're on page 1
  • Next