Best Identity Management Software in New Zealand

Find and compare the best Identity Management software in New Zealand in 2024

Use the comparison tool below to compare the top Identity Management software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 2
    GateKeeper Proximity Password Manager Reviews
    Proximity-based passwordless login for desktop applications, Macs, websites, PCs, Macs and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords, enforce 2FA and give employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password changes will be reduced. Login to enable auto-lock and presence detection
  • 3
    Tenable Cloud Security Reviews
    The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually.
  • 4
    RadiantOne Reviews
    Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes.
  • 5
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress, Authorization API to your application. Authorization can be complicated quickly. Even though it seems simple, there are many hidden complications involved in authorization. It is not something you want to do on your own. It takes time to get authorization right. In simple cases, it takes an average of 840 hours to implement authorization logic. This number increases rapidly as you add more features to your app. Your application is your biggest security vulnerability. If you don't have the right skills, your doors are open to malicious attacks. You run the risk of compromising user data, non-compliance to local regulations, and major business losses. Features: Secure authorization API. Instead of creating your own authorization logic, call our API. Written by developers for developers. Granular permissions. Define multiple levels and group them by user role. You can be as specific as you like; Identity provider integrations; Simply call an API to connect any ID provider.
  • 6
    BastionPass Reviews

    BastionPass

    BastionWare

    $1.59 per user per month
    BastionPass was created out of necessity to provide a collaborative, all-encompassing platform that can be used by family and coworkers in a way that other password management solutions don't offer. Our goal has been to create a single identity management system and share capabilities using a simple interface. This makes it easy for individuals and teams to manage their passwords. BastionPass will manage your passwords for you so that you don't have to. Our plugin will automatically log you in to all other sites once you have signed in with your master password. You can easily create complex passwords for all of your logins. Keep them safe in our vault, which is triple-encrypted. Access, manage, and share passwords from your desktop or mobile device easily. BastionPass was built from the ground up to meet your digital life requirements.
  • 7
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security defense must be able to stop both internal and external threats. One common factor unites external and internal threats. The end user's compliance with security, policy, best practices. External elements can exploit an unacquainting internal user's compliance to sound security policies to gain entry. Although external threats can be dealt with using various mechanisms, such as firewalls and other security tools, it is inherently rooted in internal weaknesses. You can reduce internal threats by simply creating "automatic and enforceable" security policies. This will require end-users adhere to secure access protocols using trusted credentials. LogMeOnce Patented technology offers many ways to protect your agency, team members, and credentials with advanced automated authentication. LogmeOnce dashboard gives users powerful and unified access across all their applications.
  • 8
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 9
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 10
    UTMStack Reviews

    UTMStack

    UTMStack

    $25 per device per month
    A centralized management dashboard gives you complete visibility into the organization. All solutions in the stack can be integrated with one another and report to a single database. This makes it easy to perform daily tasks like monitoring, investigation and incident response. Both active and passive vulnerability scanners are available for early detection. They also provide compliance audit reports. Manage accounts access and permission changes. Alerts are sent when suspicious activity occurs. Remotely manage your environment, and respond to attacks from your dashboard. Keep track of all changes and gain access to classified information. Advanced threat protection protects servers and endpoints.
  • 11
    Approw Reviews

    Approw

    Approw

    $19 per month
    Approw is an easy to use, adaptable authorization and authentication platform that can be used with many on-premises applications. Approw focuses on identity and creates a social infrastructure to allow identity sharing across all SaaS users and software. This helps companies create a secure modern IT infrastructure that protects their business and redefines the user experience. Multi-factor authentication (MFA), a simple and effective security method that goes beyond usernames or passwords, adds an additional layer of security. U-Shield is for banks, and off-site login requires SMS verification. Empower Approw applications can quickly enable multifactor authentication (MFA) and improve access security and authentication levels. Multi-factor authentication that is "adaptive" can be used in lieu of traditional multi-factor authentication. It can also choose to use different MFA methods depending on the security situation.
  • 12
    Catalyst Cloud Reviews

    Catalyst Cloud

    Catalyst Cloud

    $0.017 per hour
    We are New Zealand's leading innovator in cloud computing and we are helping to make the cloud more accessible to help accelerate the growth of the digital economy in Aotearoa. It's easy and affordable to get started with pay-as-you go, curated services or standardized APIs. It's easy to scale up or down as needed. Sign up for a free trial to give our service a shot. We were the first to offer a CNCF-certified Kubernetes service in New Zealand. We were also the first to offer five key characteristics of cloud computing as per NIST. We have only scratched the surface on what is possible in the cloud. We want to explore more. We are proud members of the open-source movement and believe that open standards provide superior value and freedom for our customers. OpenStack is the foundation of our cloud and many cloud providers around the world use it.
  • 13
    Access Auditor Reviews

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 14
    Incode Omni Reviews

    Incode Omni

    Incode Technologies

    varies
    Our flagship identity solution, Incode Omni introduces a new generation of authentication and verification systems that automate the management of transactions. We use advanced Artificial Intelligence (AI) and Machine Learning (ML), along with User-centric design principles, to create a user-centric experience by enabling personalized interactions in multiple domains. An advanced Identity Management System allows banks to increase their revenue while reducing fraud, while providing convenience and outstanding experiences for users.
  • 15
    C2 Identity Reviews

    C2 Identity

    Synology C2

    $19.99 per month
    Group management allows you to grant or revoke user access. To manage user accounts, you can access the admin console via a browser. A self-service portal allows users to manage their credentials and personal information. You can centrally manage users, groups and workstations. You can easily migrate users from an LDAP, Windows AD server or Microsoft 365 server. Users can reset their passwords, secondary email addresses, phone numbers, addresses, and other details to free up IT staff's time. For fast local authentication, create LDAP servers on-premises. Streamline authentication for SaaS apps with SSO and user accounts provisioning. C2 Identity's low latency hybrid architecture allows you to authenticate locally via an LDAP server for quick offline authentication.
  • 16
    Sima Reviews

    Sima

    Active Witness

    Free
    Sima does more than keep bad guys out. Sima is a cloud-based Access Control reader that is highly secure and yet easy to use. Sima can read both facial biometrics and mobile credentials (QR codes). This cloud-based integrated software can issue single (QR only), and multi-factor (facial verification) codes for highly secure and customized facility access. We respect your privacy. To perform facial authentication, we use facial recognition technology. This technology allows us to verify identity, and allow access to a specific location. Only for identification purposes, facial data will be stored on our servers. We will not share your personal data, including your face image, with any third parties.
  • 17
    Verosint Reviews

    Verosint

    Verosint

    $279 one-time payment
    Bad actors are highly interested in user credentials. Verosint helps companies deliver trusted online experiences by detecting and preventing account theft, new account fraud and account sharing attempts. Your digital business is at stake if account security is not properly strengthened. Interact with customers confidently, no matter what device or platform they use. Verosint allows your customers to enjoy a low-friction, seamless transaction path. It also stops suspicious users from creating a new account or logging in. Our patent-pending technology uses machine learning to analyze millions of data points and turn them into actionable insights. Verosint is cloud-native, built for scale, and works in the background, assessing risk and orchestrating account security and fraud control so quickly that you won't even know we are there.
  • 18
    Ory Reviews

    Ory

    Ory

    $29 per month
    The missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple.
  • 19
    Infisign Reviews

    Infisign

    Infisign

    $4/per month
    Infisign's Identity and Access Management platform is a cutting edge IAM platform that revolutionizes the digital security industry by leveraging decentralized identities, passwordless authentication and federation capabilities. The solution allows organizations to streamline authentication, manage access efficiently and ensure compliance in diverse environments. Infisign's unique approach addresses the challenges of traditional IAM and offers a comprehensive modern identity management solution.
  • 20
    walt.id Reviews
    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps. Our wallet infrastructure contains the following products and functionalities: White Label Wallets: Launch identity wallets fast with our open source progressive web app and UI. Embedded wallets: Extend your existing applications with all the identity and crypto capabilities you need. Mobile Wallets: Build a mobile apps (iOS, Android) with our multi-platform libraries and SDKs.
  • 21
    Azure-AD-External-Identities Reviews

    Azure-AD-External-Identities

    Microsoft

    $0.00325 per month
    Azure Active Directory External Identities is part of Microsoft Entra and provides highly secure digital experiences to partners, customers, patients, citizens or anyone outside your organization. Customization controls are available. Combining external identities and user directories into one portal will allow you to manage access across your organization seamlessly. Give remote and onsite employees access to their apps, so they can be productive wherever they are. Automate workflows to simplify user lifecycle management. Self-service identity management saves admin time and resources. Single sign-on simplifies access to thousands of SaaS applications that are pre-integrated from any location and on any device.
  • 22
    PropelAuth Reviews

    PropelAuth

    PropelAuth

    $150 per month
    Developers will find it easy to integrate and use the APIs. User management built-in for teams that interact with customers. Data and insights for executives and PMs. PropelAuth was built on the belief that a great authentication product should get out of your way. We give you the tools you need to make sure your users have a smooth and secure experience. Your team will be given a list of tasks and information to complete as soon as they begin onboarding new users. PropelAuth is a first class concept when it comes to organizations. Our UIs will help you get started quickly, or you can build your own using our APIs. Create your own roles or start with our defaults. We will even update existing users when you make changes. Integrating with identity providers like Okta or Azure AD is easy. We provide guides to help your users set up and test configuration. Set custom session durations for each organization, enforce MFA and more. We take care of the complexity, so you don't need to.
  • 23
    ZITADEL Reviews

    ZITADEL

    ZITADEL

    $100 per month
    ZITADEL, an open-source platform for identity and access management, simplifies authentication and authorization of applications. It has a wide range of features including customizable hosted logins pages, support for authentication methods like Single Sign-On (SSO), social logins and multifactor authentication. Developers can integrate authentication into their applications directly using ZITADEL APIs or create dedicated login interfaces. The platform is multi-tenant and supports role-based control. This allows for precise permissions based on roles. ZITADEL’s extensibility allows for seamless adaptation to workflows, user-management processes, and brand guidelines. Features like ZITADEL Actions execute workflows based on predefined events, without the need for extra code deployment.
  • 24
    RapidIdentity Reviews

    RapidIdentity

    Identity Automation

    Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs.
  • 25
    PracticeProtect Reviews
    A password manager is not necessary. A cloud and data security platform that is specifically designed for accountants is required. Practice Protect is trusted worldwide by more accountants than any other data or password tool. It can be used for everything, including compliance, advisory, single sign-on, and one click offboarding. You can expand your practice, hire with confidence and operate remotely. With upgraded login security, email security and cyber threat training, you can support your teams wherever you are. It's all integrated. Accounting firms are safer and more scalable when they use Practice Protect. They have access to over 50 custom-built features as well as over 6,000+ integrations. Practice Protect is the perfect cloud and cyber security platform to protect modern accounting firms. It offers up to 10x the encryption of retail password managers, compliance templates, security training, and unlimited support. Learn why Practice Protect is preferred by more accountants than any other data security tool worldwide.