Best Identity Management Software in Canada

Find and compare the best Identity Management software in Canada in 2024

Use the comparison tool below to compare the top Identity Management software in Canada on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    CoreOne Suite Reviews
    CoreOne Suite: Who uses it? CoreOne Suite is an identity management and access management software designed for medium and large businesses. CoreOne Suite is compatible with both enterprise IAM and customer IAM environments. What is CoreOne Suite? CoreOne Suite is a Swiss Identity and Access Management Software for Enterprise IAM and Customer IAM Solutions. Unique IT operations management functions extend the reach of identity management and access management for greater efficiency and security. CoreOne Suite allows organizations to achieve sustainable compliance and reduce risks.
  • 2
    ZignSec Reviews
    The best solution for business tasks such as KYC, AML, and verification procedure. Our software verifies more than 3,000 government-issued documentation from over 190 countries. This is millions of verified identities every year. Many people work behind the scenes in order to make the lives millions, and perhaps one day, billions of people, safer online. Automate KYC & AML. Use the best customer experience. ZignSec has developed a customer due diligence software that is award-winning. Automate the verification process to provide your users with a great user experience. Big4 has successfully audited the platform to ensure full compliance with eKYC regulations and standards. The best document recognition software on the market. Includes non-Latin language. Save money if you need to verify your customer more than once.
  • 3
    SecurEnds Reviews
    SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations.
  • 4
    IdRamp Reviews
    Your digital identity strategy should be a business asset and not a liability. Stop wasting time, money and human resources replatforming insecure ID technology. Idramp's decentralized zero trust Identity simplifies authentication. Your identity management chaos can be sorted. You can speed up the delivery of services to meet your business's needs. Rapid modular deployment eliminates expensive platform upgrades Rapid integration seamlessly integrates with existing infrastructure to relieve the pain of bespoke integration. Modular architecture allows you to tailor your customer experience and eliminate vendor stack lock-in. Automated security policies and adaptive access control ensure zero trust identity. Extensible ecosystems can be managed with state-of-the-art data protection. Do not trust, but always confirm that your applications are secure.
  • 5
    Saviynt Reviews
    Saviynt offers intelligent identity access management and governance to cloud, hybrid, and on-premise IT infrastructures in order to accelerate enterprise digital transformation. Our platform integrates seamlessly with the most popular IaaS, PaaS and SaaS applications, including AWS Azure, Oracle EBS and SAP HANA. Gartner awarded the Trust Award to our IGA 2.0 advanced risk analysis platform and named it an industry leader.
  • 6
    IAMCompare Reviews

    IAMCompare

    IAMCompare

    $500 per month
    IAMCompare is the only solution that focuses on auditing the integrity and de-provisioning of your Provisioning and De-provisioning processes. We track user access exceptions, identify them and resolve them, which reduces both time and costs. IAMCompare provides companies with direct visibility into their accounts. Our solution delivers results at a transparent cost. Our clients then identify assets (applications databases, devices, and other) that need monitoring and provide relevant account data. IAMCompare combines account and census information to identify actionable anomalies. You can view account access for employees, authorized contractors, vendors, and customers. Use IAMCompare for system access reviews and standardization of vendor, customer, and other third-party user certifications.
  • 7
    IdentityX Reviews
    Daon's IdentityX platform is multi-modal, vendor-agnostic, and future-proof. It addresses all aspects of customer identity lifecycle. Trust in digital identities is built on a user-centric, unified view of identity creation, management, and use. The IdentityX Platform offers the following core functions: Identity Establishment via account origination and digital boarding, Omni-Channel multi-factor authentication via mobile, web and call center authentication, Identity recovery and other device and account management functions. Daon's IdentityX Digital onboarding product allows for quick and accurate identification establishment for a variety of purposes, including Anti-Money Laundering checks (AML) or Know Your Customer (KYC).
  • 8
    Google Cloud Identity Reviews

    Google Cloud Identity

    Google

    $6 per user per month
    Unified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud.
  • 9
    TozID Reviews
    A platform for Customer Identity Management and SSO with privacy and end to end encryption. You can centralize access control without increasing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it - secure your customer's accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you'd expect, including SAML & OIDC Support along with push-based MFA. These are some of the key features that we think you will love!
  • 10
    MobiKEY Reviews
    Generate exceptional outcomes for your organization with real-time secure delivery of actionable intelligence--whether in a manufacturing plant, in-theater, or in a university parking lot. Your performance potential is unlimited when you have the right analysis. We can help you identify key insights and eliminate your limitations while providing military-grade data security. Route1 helps organizations of all sizes use the data they have, and data they didn’t know they had, to make better decisions and gain enormous advantages...without compromising data security. Protect your data with our patented technologies. Real-time data acquisition and analytics allow you to understand the data. Use rugged, industrial-grade devices to visualize data. Advanced technologies and services allow you to make the most of your data. We can help you make better decisions and achieve extraordinary outcomes by leveraging the data that you already have and the data that you don't know about.
  • 11
    Auth.GG Reviews

    Auth.GG

    Auth.GG

    $14.95 one-time payment
    Securely license and sell your software. Software developers have unprecedented protection with us. Our developers are experts in protecting your product's security. Our goal is to provide a panel that meets all your requirements without breaking the bank. To ensure the best performance, our team of developers follows industry-standard cryptographic techniques. Our support team is available to help you with any issues you may have with our services. We want our panels to be unique and well-designed so that our customers are happy. Our authentication system allows you to license programs in almost any language. You can manage all your users, generate licenses, and view logs.
  • 12
    ManageEngine Identity Manager Plus Reviews
    A secure, single sign-on (SSO) solution for enterprises. ManageEngine's Identity Manager Plus, the IT division at Zoho, allows end users to access the applications they need in one click. IT administrators can also manage and monitor application access using a single console. Users can gain secure, one-click access for enterprise applications. To access all their applications, users only need to log in once. Allow SSO to hundreds popular applications from our app catalog, or any SAML-based internal app using custom integrations. Track who accessed which application, when, and from what source. Find out which applications are most used, inactive users, etc. You can import users directly from G Suite or Azure AD. Or you can use the Zoho Directory built-in to onboard contractors and temporary employees. You can configure SSO for applications, add users and enable application access to users. You can also track application access from one central console.
  • 13
    SecZetta Customer Identity Reviews

    SecZetta Customer Identity

    SecZetta

    $70,000 per year
    The identity lifecycle of an employee can be managed entirely by one department (Human Resources, People Operations). It typically involves a sequence of managed activities that includes the opening of a job, the selection of candidates, screening and onboarding activities, managing access and job transfers, termination, and managing access. Although other departments may be involved in the process, only one team is responsible for communication, progress, and meeting corporate requirements. Integrations between HR technologies and downstream technologies like IT Ticketing or IAM systems allow for the creation and tracking of workflows. Third-party users' identity governance is more chaotic and less linear. For one, large enterprises are not always able to provide formal procurement vetting or identity management processes for third-party users. Additionally, responsibilities can be distributed across business lines, Legal, HR and Compliance.
  • 14
    DoubleClue Reviews
    DoubleClue, an Identity and Access Management Platform from HWS Group in Bavaria, allows you to manage access rights and identities. It protects company networks from cyberattacks that target digital identities/the "human factor" by using modern multi-factor authentication. The platform also offers integrated password management and secure cloud storage to protect confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On-premises or in the cloud. DoubleClue protects any part of your business that isn't covered by firewalls or virus scanners. This includes the human factor, which is the most vulnerable component in any IT security. A strong, all-in-one platform protects all digital accesses, applications, passwords, and confidential data. Employees expect maximum flexibility in the digital workplace. Allow them to work anywhere, on any device, without compromising their IT security.
  • 15
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • 16
    CyberArk Customer Identity Reviews
    Your customers will be delighted by easy and secure access via your apps and websites. This will keep them loyal to you. Customers expect great digital experiences. The attack surface is becoming more permeable than ever. CyberArk Customer Identity allows you to securely open your apps and websites to customers. Easy integration, intuitive access controls, and frictionless sign on. All your privacy, consent, and identity verification in one platform. Pre-built widgets and APIs reduce development effort. Secure access to business apps for both human and machine identities. Secure access to machine identities within the DevOps pipeline. IT can be simplified and made easier while improving business security. Secure single sign-on access for your apps and services.
  • 17
    IBM Security Verify Reviews
    Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.
  • 18
    Locurity Reviews
    Locurity offers a patent-pending 360 degree security platform that uses 'zero trust security model to continuously defend this new enterprise identity perimeter'. Protect your identity, it is the new enterprise perimeter. Protect yourself against 81% of all cyberattacks. Security breaches often begin with compromised identity (Verizon DBIr). Detect cyber attacks proactively. Protect your enterprise assets before they turn into breaches. Secure your enterprise assets. Protects against identity/credential-borne attacks like phishing, whaling and hacking. Decentralized architecture - No honeypot of identity crown gems. Increase productivity while minimizing cost of login/password/access related helpdesk tickets. Email, VPN, SaaS, Office365, GSuite Salesforce, BOX Slack Healthcare/Finance applications and many other. Multi factor authentication based on biometrics (TouchID/FaceID), pin/pattern and elliptic curve cryptography.
  • 19
    Entrust Identity Enterprise Reviews
    Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one.
  • 20
    Nomidio Reviews

    Nomidio

    Nomidio

    $3.88 per user per month
    The world's leading unified Identity and Authentication Service. Nomidio is a specialist in protecting identities. Our federated cloud of identity allows companies to eliminate unnecessary PII. We also enable secure customer identification for loan application, verification of customers to access accounts information, and many other purposes. The Nomidio Identity Cloud is an identity vault that is extremely secure and quantum-ready. The ID cloud provides multiple identity services to multiple organisations, eliminating the costly risk of companies propagating identity data as it is today. Our parent company's Quorum multiparty split-key cryptography is used to secure the identity data. Anyone wishing to decrypt any record will need the consent of other key fragment holders. Nomidio IDC, a lightweight, highly efficient biometric identity and authorization tool that is 100% SaaS, can be deployed in just minutes.
  • 21
    ImageWare CloudID Reviews
    ImageWare CloudID®, a modular software platform, allows rapid development and deployment high-security, yet flexible, biometric identity management solutions. ImageWare CloudID®, which is cloud-ready, can be easily integrated into existing or new cloud-enabled environments. It can also be used as cloud-ready software in traditional networked client servers and data center IT infrastructures. This biometric identity platform is distinguished by two innovations. It can easily be integrated into existing cloud-enabled environments or as cloud-ready software into traditional networked client server and data center IT infrastructures. The system can also be scaled to meet the needs of small organizations and entire counties, providing highly-scalable, real-time solutions. ImageWare CloudID's platform is a collection of configurable software modules that can be used to enhance or improve biometric identity management and credential issue capabilities to existing applications, or to support the development of such capabilities in new applications.
  • 22
    Juniper Identity Management Service Reviews
    Access to corporate data should be a top priority. Access to corporate data can be abused by insiders who have direct access. User access must be controlled and enforced across all levels of the organization, including mobile and cloud, to ensure the safety of corporate resources. Juniper Identity Management Service improves enterprise security by authenticating and restricting user access. It is the first line of defense for protecting corporate assets and preventing corporate breaches. Employees are identified and assigned corporate roles which determine what data and applications they can access. Juniper Identity Management Service seamlessly integrates to SRX Series next generation firewalls. This allows security teams to match user roles and application activity to security policies. It can then generate detailed user-metrics as well as audit reports for detailed reporting.
  • 23
    Clear Skye IGA Reviews
    Organizations need to understand and manage who has access to what across their entire IT ecosystem: cloud and on-premises application stack, infrastructure, DevOps pipelines. This is important for both external (regulatory compliance) and internal (security and risk management, employee experience and productivity) reasons. Legacy identity solutions have not met the needs of modern organizations with over 50% of Identity Governance programs being in distress and more than 75% looking to replace their current solution (Source: Gartner). They are unable to keep pace with shifts in business due to digital transformation and the rise of the business platform. Clear Skye, the only identity governance and security solution built natively on ServiceNow, optimizes enterprise identity and risk management with a platform-first approach. The company provides workflow management, access requests, access review, and identity lifecycle management tools to a broad set of vertical markets. By leveraging an existing ​business platform, Clear Skye enables customers to ​reduce friction and IT hurdles, while improving workflows and user experience.
  • 24
    Deepnet DualShield Reviews
    You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe.
  • 25
    Huawei IAM Reviews
    You can create IAM users and groups, and grant permissions to them using policies and roles. This allows you to allow or deny access to certain services and resources. You can delegate access to your HUAWEI CLOUUD resources to a trusted HUAWEI account or cloud service by assigning permissions. You can establish a trust relationship between HUAWEI CLOUUD and your existing identity system by creating an SAML-based, OpenID Connect-based identity provider, or a custom identity broker. This allows users within your enterprise to log in to HUAWEI CLOUUD using single sign-on (SSO). You can require IAM users that they complete identity authentication every time they log in to HUAWEI CLOUD or perform a critical operation. IAM allows you create IAM users and allow them to access your resources securely using their username and password. IAM allows you, based on your permissions, to authorize another HUAWEI Cloud account or cloud service to access your resources.