Best Identity Management Software in the UK

Find and compare the best Identity Management software in the UK in 2024

Use the comparison tool below to compare the top Identity Management software in the UK on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Email Hippo Reviews

    Email Hippo

    Email Hippo

    $10.00/one-time
    Email Hippo provides email verification products for marketers, developers and fraud fighters. CORE is a self-service web app that allows users to import lists of up to 500,000 emails and check whether they are valid and trustworthy. This enables marketers to remove bad data from their email lists, reduce bounce rates and improve deliverability. MORE is Email Hippo's API product. It allows users to embed email verification directly within their sign-up forms, CRMs and other business apps. MORE checks every email against up to 74 data points for maximum accuracy and reliability. With ASSESS, users can check email addresses for specific pre-fraud indicators such as gibberish, recently registered domains and dark web links. ASSESS is also accessed via API and provides pre-fraud intelligence in real time. Email Hippo has provided email verification since 2000 and became ISO27001 certified in 2017.
  • 2
    The OptimalCloud Reviews

    The OptimalCloud

    Optimal IdM

    $2/user/month
    The OptimalCloud from Optimal IdM provides a scalable and affordable Identity and Access Management Solution that meets the security and usability requirements of small, medium-sized and large enterprises. The OptimalCloud platform is available for both consumer and workforce deployments. Each pricing tier includes multi-factor authentication (MFA), because good security shouldn't be more expensive. The OptimalCloud integrates with over 11 thousand applications, making it easier to set up and configure. It also offers 24 x 7 x 365 support with a 99.99% uptime guarantee.
  • 3
    DSRAZOR for Windows Reviews

    DSRAZOR for Windows

    Visual Click Software

    $500/year
    Quickly list file and folder NTFS permissions and share permissions. Find out who owns the files on your shared disk space. Manage NTFS security permissions. Find and remove unwanted file security permissions. Modify existing permissions directly from a trustee report. Add Trustee(s) Copy Trustee(s) Modify Trustee permissions for selected AD object Remove Trustee assignments for selected AD object Remove 'Read' permissions from the SHARE Remove 'List Folder Contents' from the SHARE's NTFS permissions Find files/folders with no owner (Orphaned SID) and remove Report on users, groups and computers. Check that your Active Directory object attributes are consistent with your enterprise standard. You can find accounts that have been locked, disabled, expired, or unused for more than x days. Automate common Active Directory management tasks. Automatically synchronize Student Information System (SIS), to Active Directory. Create/Import/Update users and groups, as well as computers, including bulk management. No scripting required to effectively manage Active Directory Move/Delete inactive users, groups, and computers. Reset passwords in bulk Mass object imports can be done from a CSV file.
  • 4
    OpenOTP Security Suite Reviews

    OpenOTP Security Suite

    RCDevs

    €1.85/User/M
    OpenOTP Security Suite is an enterprise-class security solution for two-factor authentication with U2F/OTP, federation and identity management (IAM). The solution combines mobile technologies with proven security standards to provide the best alternative for business and non-business users who need cost-effective solutions that support their users' mobility. It enables integration of a variety of third-party products and systems with MFA, even if they only support LDAP as an authentication backend. Try OpenOTP Security Suite if you are interested in: USER MOBILITY | PRIVACY | VPN AND WIFI SECURITY | SSO AND ADFS | FINE-GRAINED AUTHENTICATION POLICIES | ALL-IN-ONE SECURITY SOLUTIONS | EUROPEAN DATA STORAGE OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)
  • 5
    Onboardbase Reviews

    Onboardbase

    Onboardbase

    Free
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 6
    System Frontier Reviews

    System Frontier

    Noxigen

    $29/year
    PowerShell web front-end with role-based access control, auditing, and remote management tools. You can delegate granular permissions for managing servers, workstations, network devices, and user accounts. Privileged Access Management
  • 7
    SecureAuth Reviews

    SecureAuth

    SecureAuth

    $1 per month
    SecureAuth makes it easy and seamless to create digital experiences that support Zero Trust initiatives. SecureAuth provides a frictionless user experience that protects employees, contractors, and partners. This helps to reduce business risk and increase productivity. Secure, secure, and unified customer experiences will enable you to support your digital business initiatives. SecureAuth uses adaptive risk analytics to analyze hundreds of variables such as human patterns, device fingerprinting and geolocation to create each user’s digital DNA. This allows for continuous authentication in real-time, ensuring the highest level security possible throughout the digital journey.
  • 8
    UserLock Reviews

    UserLock

    IS Decisions

    $2.00/month/user
    UserLock | Two Factor Authentication & Access Management for Windows Active Directory
  • 9
    Adaxes Reviews

    Adaxes

    Softerra

    $1,600 one-time payment
    Adaxes is a management solution that automates Microsoft 365 environments, Exchange, and Active Directory. Adaxes is a rule-based platform that can be used to automate Microsoft 365, Exchange, and Active Directory. It also provides a web-based management environment. You can use a role-based access control model to delegate privileges, adds security and workflow approvals, and allows you enforce corporate data standards. Adaxes automates all aspects of user lifecycle management, including provisioning, reprovisioning, and deprovisioning in Active Directory, Microsoft 365, and Skype for Business.
  • 10
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 11
    MonoSign Reviews

    MonoSign

    MonoFor

    $4/month/user
    MonoSign is a complete Identity & Access Management Solution for Enterprise Level Companies. Get Universal Directory, Single-Sign-On, Adaptive Multi-Factor Authentication, Lifecycle Management, and many other features. MonoFor is here today with MonoSign, one of the most powerful and easy-to-deploy Identity & Access Management Software for enterprise-level companies.
  • 12
    Aerobase Reviews

    Aerobase

    Aerobase

    $690 per month
    Aerobase is an open-source Identity & Access Management (IAM) platform. It specializes in identity Federation, SSO, strong authentication, adaptive authentication, access control and account management. API & Microservices security and privacy regulation are some of its specialties. This guide will help you get started with Aerobase. This guide covers server configuration and the use of the default data base. Advanced deployment options are not covered. Refer to the other reference guides for a more detailed description of features and configuration options.
  • 13
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 14
    Ermetic Reviews

    Ermetic

    Ermetic (a Tenable Company)

    Ermetic’s holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate immediately. From full asset discovery and deep risk analysis to runtime threat detection and compliance, Ermetic automates complex cloud security operations through meaningful visualization and step-by-step guidance. Using an identity-first approach, Ermetic dramatically reduces your cloud attack surface and enforces least privilege at scale. Ermetic empowers stakeholders across the organization with pinpoint accuracy that drives accurate risk prioritization and remediation across multicloud environments. Ramp up your security from development to production with an agentless solution that deploys in minutes and delivers actionable insights within hours.
  • 15
    Gravitee.io Reviews

    Gravitee.io

    Gravitee.io

    $2500 per month
    Gravitee.io, the most cost-effective, performant, and cost-effective Open Source API Platform, allows your organization to securely publish, analyze, and secure your APIs. Gravitee.io's OAuth2 OpenID Connect (OIDC), and Financial-grade API(FAPI) certified servers allow you to manage your identities. Gravitee.io APIM allows you to control precisely who, when, and how your APIs are accessed by your organization. It is lightweight, flexible, and lightning-fast. Gravitee.io allows you to manage, monitor, deploy, and secure your APIs with strong governance features like API review and API quality. Your API consumers can fully engage with your business through a Gravitee.io portal. This will ensure high quality engagement in the digital age.
  • 16
    Beyond Identity Reviews

    Beyond Identity

    Beyond Identity

    $0/ User/ Month
    Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers, employees, and developers. Unique to Beyond Identity, users never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and organizations can implement risk-based access controls using granular user and device risk captured in real-time. By default, Beyond Identity authenticates with invisible MFA that only leverages unphishable factors. This allows organizations to secure access to applications and critical data by eliminating account takeover, ransomware, and all credential-based attacks all while improving the user experience
  • 17
    ManageEngine AD360 Reviews

    ManageEngine AD360

    Zoho

    $595.00 / year
    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
  • 18
    Easy365Manager Reviews

    Easy365Manager

    Agema A/S

    $84 per year
    Office 365 Management is now easier than ever. Manage everything with AD Users & Computers. Eliminate Exchange on-premises. Easy365Manager integrates Office 365 and AD management, eliminating need to log in to web consoles or run PowerShell. Easy365Manager adds two new tabs for user properties to AD Users & Computers. You can now manage EXO mailboxes from AD user properties, including complex settings such as calendar delegation which would otherwise require PowerShell scripting. Easy365Manager allows your first-level admin to work faster and reduces the number of tickets escalated to senior administrators. Easy365Manager can be installed on any PC or server with AD Users & Computers. There is no server component or service, AD Extension, or custom security layer. Easy365Manager can be installed and configured in less than 2 minutes, and you will instantly be rid of hybrid Office 365 management.
  • 19
    IDHub Reviews

    IDHub

    Sath

    $1 per month
    From a single location, you can manage who has access to which business applications and services. Drag-and-drop GUI allows non-technical users to design workflows, forms, or processes. Friendly user interfaces increase adoption and encourage user training. Filter and schedule compliance certifications by user, group, application. Support staff available 24/7. Regular documentation and video walkthrough updates. Team leaders can't control their apps or users without code design. You can create static or dynamic attributes-based roles to grant entitlements and access. All features are available in a simple, per-user pricing. No hidden "feature" costs. Eliminate passwords, hacking attacks, and IT service request for password resets. Each resource, regardless of whether it's a service or entitlement request, role, or application, must follow a specific approval process known as the approval workflow.
  • 20
    Daito Reviews

    Daito

    Daito

    $19 per month
    Daito is a web-based 2FA authentication tool for small and large companies. No phone required to securely share access. Daito does one thing: it manages TOTP 2FA tokens. This gives you a completely isolated system that is independent from your password manager. To avoid worst-case scenarios, keep your 2FA token management separated from your password management. What should you do if your password manager is breached and usernames, passwords and 2FA seeds are stored? The authenticator can be accessed from any web browser. You can access and manage 2FA tokens for your company from any browser or OS. You can save money and avoid the hassle of managing company phones. No more worries about lost, broken, or missing devices. Give IT admins and IT teams full control and limit regular users. Limit access to generated tokens only, and not the underlying seed code, to prevent 2FA seed leakage.
  • 21
    Logto Reviews

    Logto

    Silverhand

    $0
    Logto is a modern Auth0 replacement designed for SaaS and apps. It is a great choice for growing companies and individuals. Comprehensive Identity Solution Logto SDKs enable easy authentication. Supports multiple sign-in methods, including social and passwordless. Customize UI components to match brand. The infrastructure is ready-to-use, so there's no need to do any extra setup. Provides a ready-to-use management API It offers flexible connectors to customize and scale, and is customized for SAML, OAuth and OIDC protocols. Enterprise-ready, with role-based Access Control (RBAC), Organizations (multi-tenant applications), User Management, Audit Logs, Single Sign-On (SSO), Multi-factor Authentication (MFA), and Single Sign-On (SSO).
  • 22
    PortalGuard Reviews

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods.
  • 23
    AuthStack Reviews

    AuthStack

    Buckhill

    €41.25 per month
    AuthStack is a host-anywhere, Enterprise-grade Single Sign-On (SSO), and Identity Access Management System (IAM). It can log in users to your own websites and applications, as well as third-party websites. AuthStack centralizes your user identification management. Instead of managing multiple logins for each website or application, the user only needs to log in once and maintain a single password and profile. If your website or application supports SAML, integration with AuthStack does not require any custom coding. We provide a Connector Framework for those sites that do not support SAML. If required, we can help you integrate the Connector. You don't need to migrate any existing user databases. AuthStack bundles with a Connector Framework that can communicate with any data source (LDAP, MySQL SOAP API, SOAP API, SOAP API, etc.) to verify credentials from existing user database(s).
  • 24
    Ekran System Reviews
    Ekran System is a full cycle insider risk management platform with capabilities in employee monitoring, privileged access management, subcontractor control, and compliance tasks. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on the Ekran System! Key solutions: - Insider threats management - Privileged Access Management - User activity monitoring - User and entity behavior analytics - Employee activity monitoring - Enhanced Auditing and Reporting
  • 25
    Teleport Reviews
    Teleport is the most secure and easy way to gain access to all your infrastructure. The open-source Teleport Access Platform consolidates all four infrastructure access capabilities that every security-conscious organization requires: authentication, authorization and audit. Teleport consolidates all aspects of infrastructure access into one platform for software engineers and their applications. This reduces attack surface, cuts operational overhead, enforces compliance and improves productivity. The Teleport Access Plane replaces legacy privileged access management technologies such as shared credentials and VPNs. This improves engineering productivity and security.