Best Identity and Access Management (IAM) Software for Small Business

Find and compare the best Identity and Access Management (IAM) software for Small Business in 2024

Use the comparison tool below to compare the top Identity and Access Management (IAM) software for Small Business on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress, Authorization API to your application. Authorization can be complicated quickly. Even though it seems simple, there are many hidden complications involved in authorization. It is not something you want to do on your own. It takes time to get authorization right. In simple cases, it takes an average of 840 hours to implement authorization logic. This number increases rapidly as you add more features to your app. Your application is your biggest security vulnerability. If you don't have the right skills, your doors are open to malicious attacks. You run the risk of compromising user data, non-compliance to local regulations, and major business losses. Features: Secure authorization API. Instead of creating your own authorization logic, call our API. Written by developers for developers. Granular permissions. Define multiple levels and group them by user role. You can be as specific as you like; Identity provider integrations; Simply call an API to connect any ID provider.
  • 2
    BastionPass Reviews

    BastionPass

    BastionWare

    $1.59 per user per month
    BastionPass was created out of necessity to provide a collaborative, all-encompassing platform that can be used by family and coworkers in a way that other password management solutions don't offer. Our goal has been to create a single identity management system and share capabilities using a simple interface. This makes it easy for individuals and teams to manage their passwords. BastionPass will manage your passwords for you so that you don't have to. Our plugin will automatically log you in to all other sites once you have signed in with your master password. You can easily create complex passwords for all of your logins. Keep them safe in our vault, which is triple-encrypted. Access, manage, and share passwords from your desktop or mobile device easily. BastionPass was built from the ground up to meet your digital life requirements.
  • 3
    Ubisecure Reviews
    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically. Whether your business goals are increasing revenue and user engagement, meeting compliance, de-risking homegrown systems or reducing operational costs, Ubisecure identity management can help.
  • 4
    Approw Reviews

    Approw

    Approw

    $19 per month
    Approw is an easy to use, adaptable authorization and authentication platform that can be used with many on-premises applications. Approw focuses on identity and creates a social infrastructure to allow identity sharing across all SaaS users and software. This helps companies create a secure modern IT infrastructure that protects their business and redefines the user experience. Multi-factor authentication (MFA), a simple and effective security method that goes beyond usernames or passwords, adds an additional layer of security. U-Shield is for banks, and off-site login requires SMS verification. Empower Approw applications can quickly enable multifactor authentication (MFA) and improve access security and authentication levels. Multi-factor authentication that is "adaptive" can be used in lieu of traditional multi-factor authentication. It can also choose to use different MFA methods depending on the security situation.
  • 5
    Access Auditor Reviews

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 6
    Veza Reviews
    Data is being reconstructed to be used in the cloud. Identity is now defined in a broader sense than just humans. It includes service accounts and principals. Authorization is the most true form of identity. In the multi-cloud world, a dynamic and novel approach is needed to secure enterprise data. Veza is the only solution that can provide a comprehensive view of authorization for your identity-to data relationships. Veza is an agentless, cloud-native platform that poses no risk to the data or availability of your data. We make it simple for you to manage your authorization across your entire ecosystem of cloud services so that you can empower users to securely share data. Veza supports critical systems such as unstructured data, structured data, data lakes, cloud-based IAM and apps from the start. You can also create your own custom applications by leveraging Veza’s Open Authorization API.
  • 7
    Infisign Reviews

    Infisign

    Infisign

    $4/per month
    Infisign's Identity and Access Management platform is a cutting edge IAM platform that revolutionizes the digital security industry by leveraging decentralized identities, passwordless authentication and federation capabilities. The solution allows organizations to streamline authentication, manage access efficiently and ensure compliance in diverse environments. Infisign's unique approach addresses the challenges of traditional IAM and offers a comprehensive modern identity management solution.
  • 8
    Cymmetri Reviews

    Cymmetri

    Cymmetri

    $2 per month
    Cymmetri manages and protects the entire identity ecosystem, from employees and partners to customers or privileged users. Control user access with ease, ensuring efficient and secure operations in the digital world. It provides seamless identity protection to safeguard individuals and organizations anywhere, anytime. Streamline the onboarding process for all new employees. Cymmetri experts are available to discuss your IAM needs or demonstrate the power of Cymmetri. Our solutions have measurable outcomes that demonstrate the positive and tangible effects on security, efficiency and overall performance. Implementing robust cybersecurity improves data protection and minimizes the risk of breaches or unauthorized access. Our solutions will boost productivity by empowering employees to thrive within a secure, efficient and safe work environment. Our innovative solutions and optimized process will help you to increase efficiency, streamline operations and save money.
  • 9
    PropelAuth Reviews

    PropelAuth

    PropelAuth

    $150 per month
    Developers will find it easy to integrate and use the APIs. User management built-in for teams that interact with customers. Data and insights for executives and PMs. PropelAuth was built on the belief that a great authentication product should get out of your way. We give you the tools you need to make sure your users have a smooth and secure experience. Your team will be given a list of tasks and information to complete as soon as they begin onboarding new users. PropelAuth is a first class concept when it comes to organizations. Our UIs will help you get started quickly, or you can build your own using our APIs. Create your own roles or start with our defaults. We will even update existing users when you make changes. Integrating with identity providers like Okta or Azure AD is easy. We provide guides to help your users set up and test configuration. Set custom session durations for each organization, enforce MFA and more. We take care of the complexity, so you don't need to.
  • 10
    ZITADEL Reviews

    ZITADEL

    ZITADEL

    $100 per month
    ZITADEL, an open-source platform for identity and access management, simplifies authentication and authorization of applications. It has a wide range of features including customizable hosted logins pages, support for authentication methods like Single Sign-On (SSO), social logins and multifactor authentication. Developers can integrate authentication into their applications directly using ZITADEL APIs or create dedicated login interfaces. The platform is multi-tenant and supports role-based control. This allows for precise permissions based on roles. ZITADEL’s extensibility allows for seamless adaptation to workflows, user-management processes, and brand guidelines. Features like ZITADEL Actions execute workflows based on predefined events, without the need for extra code deployment.
  • 11
    Pirean Access: One Reviews
    We offer robust authentication and authorisation services for web and mobile. Our Access: One platform protects data, equity, and IP across critical industries. To protect their services worldwide, we partner with some the largest organizations in the world. Our private cloud identity platform allows our customers to quickly access identity services that are: - Provide a central point for controlling entitlements and identities - Flexible access management, including single sign-on and strong authentication Deliver an agile, robust IAM API to extend the reach of your identity infrastructure We are known for our innovation, versatility, and focus on the end-user.
  • 12
    Microsoft Identity Manager Reviews
    Microsoft Identity Manager (MIM), builds on the identity management capabilities of Forefront Identity Manager, and its predecessor technologies. MIM allows integration with heterogeneous platforms throughout the datacenter, including directories, HR systems, and databases. MIM enhances Azure AD cloud-hosted service by allowing the organization to have the correct users in Active Directory for on premises apps. Azure AD Connect will then make Azure AD available for Microsoft 365 or cloud-hosted applications. Common MIM scenarios include: - Automatic identity provisioning and group provisioning based upon business policy and workflow-driven provisioning. - Integration of directories' contents with HR systems and other sources. - Synchronizing identities among directories, databases and on-premises apps through common APIs, protocols, Microsoft-delivered and partner-delivered connectors.
  • 13
    ARCON | IDAM Reviews
    IDAM is a solution that ensures the details of an employee's overall employment tenure are maintained and managed from a single console. Administrators can perform access certification and review activities in a faster and more efficient way. The end users don't have to wait too much to gain access to legacy applications or business applications. You can enhance your digital experience at work by creating a digital identity for each employee, starting from the moment they start working for you. This will allow you to develop and release faster. You don't have to wait for support to respond before you can get back to work. Administrator activities such as adding, deleting, and updating user credentials are now much easier than ever. This reduces the need for help desk support, such as password change, access request, and removal.
  • 14
    Tools4ever IAM Reviews
    Streamline your operations and ensure compliance with HIPPA, SOX, or other requirements. IAM allows for user provisioning, central account management, and role-based access control through the integration of personnel and directory systems. Automated onboarding/offboarding ensures that the right people have access at the right times. You can learn more about how IAM works in your environment. It is a full-time job to manually create, manage, or disable user accounts in today’s complex corporate environment. Tools4ever's IAM user provisioning software connects HR systems, directory services (e.g. Active Directory, LDAP and GSuite) and downstream services. The entire process can be automated, allowing IT staff to recover significant bandwidth.
  • 15
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business.
  • 16
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 17
    Avatier Identity Anywhere Reviews

    Avatier Identity Anywhere

    Avatier

    $5.00/one-time/user
    Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time.
  • 18
    Core Privileged Access Manager (BoKS) Reviews
    Your multi-vendor infrastructure can be centralized into one security domain. Core Privileged Access Manager, (BoKS), transforms multi-vendor Linux or UNIX server environments into one centrally managed security area. BoKS makes it easier for your organization to enforce security policies and control access to sensitive systems and information. IT and security teams can prevent attacks from internal and external sources on critical systems by having full control over access, privilege, and accounts. For simplified administration and scaling, centralize the management of user accounts and profiles. You can secure your systems by controlling user privileges and accessing sensitive data. This will not slow down productivity. You should limit access to users and ensure that the least privilege access is allowed in your hybrid environment.
  • 19
    CoreOne Suite Reviews
    CoreOne Suite: Who uses it? CoreOne Suite is an identity management and access management software designed for medium and large businesses. CoreOne Suite is compatible with both enterprise IAM and customer IAM environments. What is CoreOne Suite? CoreOne Suite is a Swiss Identity and Access Management Software for Enterprise IAM and Customer IAM Solutions. Unique IT operations management functions extend the reach of identity management and access management for greater efficiency and security. CoreOne Suite allows organizations to achieve sustainable compliance and reduce risks.
  • 20
    Saviynt Reviews
    Saviynt offers intelligent identity access management and governance to cloud, hybrid, and on-premise IT infrastructures in order to accelerate enterprise digital transformation. Our platform integrates seamlessly with the most popular IaaS, PaaS and SaaS applications, including AWS Azure, Oracle EBS and SAP HANA. Gartner awarded the Trust Award to our IGA 2.0 advanced risk analysis platform and named it an industry leader.
  • 21
    IAMCompare Reviews

    IAMCompare

    IAMCompare

    $500 per month
    IAMCompare is the only solution that focuses on auditing the integrity and de-provisioning of your Provisioning and De-provisioning processes. We track user access exceptions, identify them and resolve them, which reduces both time and costs. IAMCompare provides companies with direct visibility into their accounts. Our solution delivers results at a transparent cost. Our clients then identify assets (applications databases, devices, and other) that need monitoring and provide relevant account data. IAMCompare combines account and census information to identify actionable anomalies. You can view account access for employees, authorized contractors, vendors, and customers. Use IAMCompare for system access reviews and standardization of vendor, customer, and other third-party user certifications.
  • 22
    Google Cloud Identity Reviews

    Google Cloud Identity

    Google

    $6 per user per month
    Unified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud.
  • 23
    TozID Reviews
    A platform for Customer Identity Management and SSO with privacy and end to end encryption. You can centralize access control without increasing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it - secure your customer's accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you'd expect, including SAML & OIDC Support along with push-based MFA. These are some of the key features that we think you will love!
  • 24
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • 25
    IBM Verify Reviews
    Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.