Best Identity Management Software in the USA

Find and compare the best Identity Management software in the USA in 2024

Use the comparison tool below to compare the top Identity Management software in the USA on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Pirean Access: One Reviews
    We offer robust authentication and authorisation services for web and mobile. Our Access: One platform protects data, equity, and IP across critical industries. To protect their services worldwide, we partner with some the largest organizations in the world. Our private cloud identity platform allows our customers to quickly access identity services that are: - Provide a central point for controlling entitlements and identities - Flexible access management, including single sign-on and strong authentication Deliver an agile, robust IAM API to extend the reach of your identity infrastructure We are known for our innovation, versatility, and focus on the end-user.
  • 2
    SentryLogin Reviews

    SentryLogin

    Sentry Login

    $4.95 per month
    Sentry has been the #1 member system for Squarespace, Weebly and WordPress since 2001. Easy to set up paywall and password protection for Weebly and Squarespace, Yola and Blogger. Sentry is simple because it was designed for non-programmers. All the login form and protection code are included so you just need to copy, paste, and publish. The Sentry Integration Wizard will guide you through setting up your subscription plans. It also guides you through the installation process. Sentry is simple, but if you get stuck, our friendly staff will respond quickly to your emails... for the rest of your life! No one offers better or faster support. You can easily customize Sentry's pages and forms using the Header/Footer (skin) tools. Better yet, let us create your skin branding for you! This service is completely free.
  • 3
    Active Login Manager Reviews
    ALM fully automates the login process. ALM also controls the log on/off process, which improves the usability and usability of Cisco IP Phone Extension Mobility. ALM will log off the connected device at certain events, such as when the screen saver starts or when the PC is locked. When the screen saver starts or the PC is locked. The ALM behavior can be customized by the user or administrator. ALM Pro is client-only and does not require the purchase of new hardware. ALM Pro can be deployed to any existing network using scripts. The software configuration is easy. The RSconnect Application Manager makes it even easier to manage large-scale installations.
  • 4
    DirectID  Reviews
    By leveraging Open Finance and bank statement data, DirectID help lenders understand their customers throughout the credit risk lifecycle, from onboarding through to collections & recoveries. DirectID Solutions include: AFFORDABILITY Automated transaction categorisation, instant insights and income verification for any customer with a bank account, all allows for more informed affordability assessments. IDENTITY Perform bank account validation checks to confirm identity, and then go beyond basic checks through our financial insights. ONBOARDING Remove onboarding friction caused by paper documents. Get seamless onboarding, verify asserted income and gather bank transactions with instant analysis in seconds. COLLECTIONS Create more informed collections programmes and better customer experiences with direct data insights. CREDIT RISK Don't rely on aged credit data and self-asserted income. Our real-time data insights supplement credit bureau reports to enable smarter credit risk underwriting. OPERATIONAL EFFICIENCY Reduce time spent on the phones and assessing documents. Connect directly to customer bank data and get automatically categorised transactions in seconds, whilst also reducing fraud.
  • 5
    Microsoft Identity Manager Reviews
    Microsoft Identity Manager (MIM), builds on the identity management capabilities of Forefront Identity Manager, and its predecessor technologies. MIM allows integration with heterogeneous platforms throughout the datacenter, including directories, HR systems, and databases. MIM enhances Azure AD cloud-hosted service by allowing the organization to have the correct users in Active Directory for on premises apps. Azure AD Connect will then make Azure AD available for Microsoft 365 or cloud-hosted applications. Common MIM scenarios include: - Automatic identity provisioning and group provisioning based upon business policy and workflow-driven provisioning. - Integration of directories' contents with HR systems and other sources. - Synchronizing identities among directories, databases and on-premises apps through common APIs, protocols, Microsoft-delivered and partner-delivered connectors.
  • 6
    ARCON | IDAM Reviews
    IDAM is a solution that ensures the details of an employee's overall employment tenure are maintained and managed from a single console. Administrators can perform access certification and review activities in a faster and more efficient way. The end users don't have to wait too much to gain access to legacy applications or business applications. You can enhance your digital experience at work by creating a digital identity for each employee, starting from the moment they start working for you. This will allow you to develop and release faster. You don't have to wait for support to respond before you can get back to work. Administrator activities such as adding, deleting, and updating user credentials are now much easier than ever. This reduces the need for help desk support, such as password change, access request, and removal.
  • 7
    DigitalPersona Reviews
    DigitalPersona®, software, allows you to go beyond multi-factor authentication. Expand to risk-based authentication, secure all applications, provide frictionless access, and deploy quickly. Industry-leading biometric solutions can improve security. Processes can be simplified, streamlined, and queues shortened to confirm identities for a variety of military, criminal justice, and citizen applications. Choose from a variety of U.are.U®, readers, modules, and sensors. The most advanced fingerprint technologies available to meet your OEM, retail, hospitality, and commercial identity management needs.
  • 8
    Tools4ever IAM Reviews
    Streamline your operations and ensure compliance with HIPPA, SOX, or other requirements. IAM allows for user provisioning, central account management, and role-based access control through the integration of personnel and directory systems. Automated onboarding/offboarding ensures that the right people have access at the right times. You can learn more about how IAM works in your environment. It is a full-time job to manually create, manage, or disable user accounts in today’s complex corporate environment. Tools4ever's IAM user provisioning software connects HR systems, directory services (e.g. Active Directory, LDAP and GSuite) and downstream services. The entire process can be automated, allowing IT staff to recover significant bandwidth.
  • 9
    AwareABIS Reviews

    AwareABIS

    Aware

    $2495.00/one-time/user
    Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware's innovative biometric solutions are critical to ensure national security and protect citizens' freedoms and liberties. Our decades-long commitment to R+D has allowed us to work with more than 80 government agencies. We are experts in biometrics, security, and compliance. AwareABIS™ is the core of our citizen ID efforts. It is an Automated Biometric Identification System, or ABIS, that allows large-scale biometric identification and duplication. It supports fingerprint, face and iris modalities. Its modular architecture makes it easy to configure and optimize for civil or criminal applications. AwareABIS, a fully-featured biometric search platform is distinguished by its open architecture.
  • 10
    UserBase Reviews

    UserBase

    Encodable

    $39 one-time payment
    UserBase is a login and password manager for your website. It is a simple web app that allows user authentication. UserBase is simple to install, even if you are not a tech-savvy. We can also install it for your today. It can be installed on any website or server because it only requires Perl and MySQL. Administrators have full control over account creation. They can add/delete accounts, and public sign up can be disabled. Public sign-ups can also be made to require admin approval or email verification before they become active. You can customize the sign-up page for users with unlimited fields. This allows you to collect any user information that is relevant to your site. Users can change their passwords and have them reset via email if they are lost. This is done without the need to contact the webmaster. For protection against brute force attacks, users can sleep for a set amount of seconds if they fail to log in.
  • 11
    GroupID Reviews

    GroupID

    Imanami Corporation

    GroupID by Imanami is a comprehensive, one-stop solution that allows you to manage Users, Groups, and Entitlements. GroupID has been a hero in AD Management for over 20 years. It has reduced helpdesk tickets and automated routine tasks.
  • 12
    Apache Syncope Reviews

    Apache Syncope

    Apache Software Foundation

    Apache Syncope, an Open Source system to manage digital identities in enterprise environments is available under the Apache 2.0 license. It was developed in Java EE technology. Identity management (or IdM), refers to managing user data on applications and systems using a combination of business processes as well as IT. Computers use data about people to make decisions. These records contain technical information that is required by the system to create and manage the account. Are you a former employee of a company, a member of an organization, or have you just created a Google account? Companies, organizations, and cloud entities all work with applications that require your data to function properly. This includes username, password and e-mail. Identity Management, in short, is responsible for managing identity data throughout the Identity Lifecycle.
  • 13
    Bravura Identity Reviews
    Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access.
  • 14
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business.
  • 15
    HID SAFE Reviews
    HID SAFE Enterprise, which is a single, central platform, advances security functions in identity management. It breaks down siloed processes and systems within organizations and allows collaboration between departments and teams. HID SAFE Visitor Manager automates all aspects of visitor lifecycles for any organization. This web-based solution allows for visitor preregistration, security background checks, access authorizations, check-in/check out, badge printing, centralized reporting and audit trail functions. HID SAFE Visitors Manager is a flexible solution that can be configured to meet each customer's specific visitor management needs. This highly scalable solution makes it easy to manage busy sites with high visitor volumes. HID SAFE Risk Analytics allows organizations to extend the power of their security data beyond traditional reporting to use it to predict security operations.
  • 16
    LogonBox Reviews
    Find the LogonBox Advantage and our innovative solutions for modern Enterprises. LogonBox is an independent software vendor. It develops software that helps organizations manage and protect user identities and credentials. LogonBox solutions can reduce helpdesk calls, increase productivity, secure access across heterogeneous enterprise environments, and protect network resources through the extension of authentication beyond the password.
  • 17
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 18
    midPoint Reviews
    Choose the best. Join hundreds of other organizations who have tried midPoint, the open source leader in Identity Governance and Administration. You can choose what works best for you: midPoint can be used on-premise, in the hybrid cloud, or in the cloud. Enhance your security and efficiency by synchronizing, policing, and identity management. MidPoint's outstanding accountability, record-keeping capabilities, and data protection scope will help you meet the regulations. Advanced privacy and data protection mechanisms allow users to take control of the personal data they have been given by organizations. Users can now access their data via self-service, reset passwords, and manage their profiles. This will enhance the digital experience. Enjoy the comfort and scalability that midPoint cloud offers. Third-party experts can be hired to manage the seamless operation. This will save you valuable time and human resource. Get the most from the synergy.
  • 19
    OmniPass Reviews
    OmniPass will automatically fill out your usernames, passwords, and login details for your favorite websites and applications. No more private papers or sticky notes to hide. OmniPass protects everything for you. OmniPass makes it easy and secure to protect your Files and Folders. OmniPass provides the same authentication as for your websites and applications. Other password managers only allow you to remember website passwords. OmniPass is a fully secure PC Application that can remember all your passwords for Windows, Websites and Applications. OmniPass interfaces directly to many of the most popular authentication devices today, including palm vein scanners and fingerprint readers, Smart Cards, TPM chip chips, Smart Cards, Smart Cards, Smart Card, Smart Card, Smart Card, Smart Card, Smart Card, Smart Card, Smart Card, Smart Card, Smart Card, Smart Card, etc.
  • 20
    Avatier Identity Anywhere Reviews

    Avatier Identity Anywhere

    Avatier

    $5.00/one-time/user
    Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time.
  • 21
    OpenText NetIQ Identity Manager Reviews
    Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority.
  • 22
    Specops uReset Reviews

    Specops uReset

    Specops Software

    Are account lockouts and password resets consuming valuable IT resources? Allow users to address common tasks in password management, including Active Directory self service password resets, password changes, and account locksouts. Specops uReset is a flexible authentication engine that revolutionizes password resets. It ensures that users have a secure method to reset their password regardless of where they are located, what device they use, or what browser they are using.
  • 23
    Activate Reviews

    Activate

    Activate

    $5.00/one-time/user
    Activate is an enterprise management solution and automation tool that manages a user’s Identity, Access, and Digital Workspace. It integrates seamlessly with Microsoft Suite offerings like Active Directory, Office 365, and Azure AD. Activate allows users to request, approve, and manage common IT systems such as Active Directory, Exchange and Office 365 for themselves and others in the organization. Activate's integration between Identity Management and Service Management allows for streamlined management of a User’s Lifecycle, from On-boarding to Offboarding. Activate's virtual LDAP technology makes Azure AD as easy to manage as Active Directory. This allows services to be seamlessly moved from on-premise to cloud without any interruptions in service.
  • 24
    PeoplePlatform Reviews

    PeoplePlatform

    Web Active Directory

    PeoplePlatform allows for you to automate and delegate all common tasks related to Identity Management. Instead of spending time on directory updates, provisioning, and deprovisioning, empower your organization to manage these tasks via a simple web interface. Create simple web interfaces that can handle even the most complicated identity management tasks within your organization. Single and bulk deprovisioning - allows users to be removed from your organization's resources. Handle Workflows – Workflow jobs can set up to run after an object has been provisioned.
  • 25
    Core Privileged Access Manager (BoKS) Reviews
    Your multi-vendor infrastructure can be centralized into one security domain. Core Privileged Access Manager, (BoKS), transforms multi-vendor Linux or UNIX server environments into one centrally managed security area. BoKS makes it easier for your organization to enforce security policies and control access to sensitive systems and information. IT and security teams can prevent attacks from internal and external sources on critical systems by having full control over access, privilege, and accounts. For simplified administration and scaling, centralize the management of user accounts and profiles. You can secure your systems by controlling user privileges and accessing sensitive data. This will not slow down productivity. You should limit access to users and ensure that the least privilege access is allowed in your hybrid environment.