Best OpenText NetIQ Identity Governance Alternatives in 2024
Find the top alternatives to OpenText NetIQ Identity Governance currently available. Compare ratings, reviews, pricing, and features of OpenText NetIQ Identity Governance alternatives in 2024. Slashdot lists the best OpenText NetIQ Identity Governance alternatives on the market that offer competing products that are similar to OpenText NetIQ Identity Governance. Sort through OpenText NetIQ Identity Governance alternatives below to make the best choice for your needs
-
1
Auth0
Okta
809 RatingsAuth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO. -
2
SecurEnds
SecurEnds
SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations. -
3
Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
-
4
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
5
Employees can access the services and applications they need without exposing their data or processes to unauthorized users. Governance software automates user provisioning, and certifies access to on-premise data and applications. This streamlines the process of validating and managing user access. You can also enforce governance through preventative policy checks and monitoring for emergency access. You can automatically identify and correct access risk violations across SAP and third party systems. Integrate compliance checks and mandatory risk mitigation in business processes. Allow users to submit workflow-driven, self-service access requests and approvals. With embedded risk analysis, identify and correct violations of segregation and critical access. Automate user access assignments across SAP systems and third-party applications. Maintain compliance roles using business-friendly terminology and terms.
-
6
Zilla Security
Zilla Security
Zilla provides security teams with the visibility and automation they need to ensure your cloud applications are compliant and secure. Zilla will ensure that your application security settings, permissions, and API-based integrations do not leak critical data. An ever-expanding cloud footprint has created a vast array of data interactions. Automated access reviews are essential for ensuring that API-based integrations and users have the right access. Access compliance is no longer possible with labor-intensive spreadsheets or complicated identity governance products that require expensive professional services. Automated collectors make it easy to pull in permission data from all your cloud and on-premises systems, as needed. -
7
AvePoint
AvePoint
AvePoint is the only provider of complete data management solutions for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service userbase in the Microsoft 365 ecosystem. AvePoint is trusted by more than 7 million people worldwide to manage and protect their cloud investments. Our SaaS platform offers enterprise-grade support and hyperscale security. We are available in 12 Azure data centers. Our products are available in 4 languages. We offer 24/7 support and have market-leading security credentials like FedRAMP and ISO 27001 in-process. Organizations that leverage Microsoft's comprehensive and integrated product portfolio can get additional value without having to manage multiple vendors. These SaaS products are part of the AOS platform: o Cloud Backup o Cloud Management o Cloud Governance o Cloud Insights o Cloud Records Policies and Insights o MyHub -
8
OpenText NetIQ Identity Manager
OpenText
Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority. -
9
Deep Identity
Deep Identity
Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc -
10
Bravura Identity
Bravura Security
Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access. -
11
IBM Verify Governance enables organizations to provision, audit, and report on user activity and access through lifecycle, analytics, and compliance capabilities. You need to know who has access to which information and how it is used within your organization. Is your identity management working intelligently? IBM is focused primarily on collecting and analyzing data about identity to support enterprise IT compliance and regulatory compliance. IBM Verify Governance will help you gain better visibility into the way access is being used, prioritize compliance actions based on risk-based insights and make better decisions using clear actionable intelligence. All of this is based on a business activity-based approach to risk modelling, a major IBM differentiator that makes life easier and more efficient for risk compliance managers and auditors. Enable and streamline self-service and full provisioning requests to quickly onboard or offboard employees.
-
12
One Identity
Quest Software
Enterprise identity and access management can be simplified. You can reduce risk, secure data and comply with compliance by allowing your users access only to the data and applications they require. Identity and access management (IAM), can now be driven by business requirements, not IT capabilities. Identity Manager allows you to unify information security policies, and meet governance requirements -- both today and in the future. -
13
Symantec IGA
Broadcom
Although user experience and instantaneous access have become the norm, the IT infrastructure supporting these efforts has grown exponentially more complex. IT organizations are under constant pressure to reduce operational costs while still complying with increasing numbers of industry and government regulations. IT organizations must allow more people to access different applications in a shorter time span, while still being accountable to a multitude of parties who control access. Identity governance and administration technologies today must be able provide broad provisioning support for both on-premises as well as cloud apps. They also need entitlements certification to verify that privileges are appropriate. All this while scaling to store millions. -
14
BalkanID
BalkanID
Use AI to automate the discovery and prioritization of risk for entitlement sprawl. Streamline access certifications and reviews across the SaaS and public cloud landscape. All third-party integrations can be connected to the BalkanID dashboard. Integrations are available for the most popular SaaS apps. Single pane of glass is available for both coarse-grained and fine-grained entitlements. It can also be used to handle outliers in SaaS or public cloud environments. Facilitate access review and certification across SaaS and public clouds. Data science and machine learning can be used to gain visibility into entitlement risks in SaaS and public clouds environments. Prioritization and discovery of entitlement risks. To ensure that access reviews are not too high-level, there is still detailed data (permissions and roles, groups, etc.). to support certification actions. -
15
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications. -
16
Evidian
Eviden
Each of us expects the same level of convenience at work as at home in today's digital world. Evidian IDaaS allows your users to authenticate once and access all available web resources transparently. You can increase their satisfaction while also improving overall security level. Every suppressed (avoided), password is one less attack vector. Evidian IDaaS integrates on-premise and cloud applications to your Transparent SO. -
17
Visual Identity Suite
Core Security (Fortra)
Visual Identity Suite (VIS), previously offered by Courion as part of its Core Security Identity Governance and Administration portfolio, empowers organizations to view user privileges and access certificates in a new way. It uses an intelligent, visual-first approach. You can quickly identify outliers and see common user entitlements using an intuitive graphical interface. This allows you to quickly identify the right people to access what information. VIS allows you to see what access looks like within your business so that you can manage identity chaos and mitigate identity risk. Intelligent and visible identity governance across all your environments is essential for reducing identity risk within your organization. To simplify your identity governance and administration, you should use a visual-first approach to the creation and management access reviews and roles. -
18
Oracle Identity Management
Oracle
Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform. -
19
SPHEREboard
SPHERE Technology Solutions
SPHEREboard is an integrated workflow that allows you to assess the environment, automate collection, identify immediate threats, and then remediate seamlessly. SPHEREboard architecture and workflows incorporate our proprietary methodology. Know your inventory, identify your vulnerabilities, and create custom Control Scorecards. These insights can be accessed holistically from both your on-premise and cloud data. To enforce Zero Trust, assign owners and run campaigns. With proper tracking and reporting, you can resolve access control violations using Virtual Workers. It is not possible to identify ownership using a single approach. SPHEREboard allows you to not only lock in our business logic on your unstructured data, but also allows for you to create your own rules. This will allow to correct incorrect ownership in your books of records and ensure that there are no ownership gaps moving forward. -
20
Fastpath
Fastpath
Fastpath's cloud based access orchestration allows organizations to manage, automate, and streamline identity, access governance and data and configuration updates - efficiently and effectively. Our intuitive cloud platform integrates GRC and identity governance into a sophisticated, yet easy-to use solution. Automate, control and monitor access to applications, data records and individual data records, all without effort. Fastpath's platform has been designed by auditors, who understand the complexity involved in securing access to business applications. We created a solution to reduce the time, costs and complexity of audit processes and reporting in order to prove compliance. -
21
Clear Skye IGA
Clear Skye
Organizations need to understand and manage who has access to what across their entire IT ecosystem: cloud and on-premises application stack, infrastructure, DevOps pipelines. This is important for both external (regulatory compliance) and internal (security and risk management, employee experience and productivity) reasons. Legacy identity solutions have not met the needs of modern organizations with over 50% of Identity Governance programs being in distress and more than 75% looking to replace their current solution (Source: Gartner). They are unable to keep pace with shifts in business due to digital transformation and the rise of the business platform. Clear Skye, the only identity governance and security solution built natively on ServiceNow, optimizes enterprise identity and risk management with a platform-first approach. The company provides workflow management, access requests, access review, and identity lifecycle management tools to a broad set of vertical markets. By leveraging an existing business platform, Clear Skye enables customers to reduce friction and IT hurdles, while improving workflows and user experience. -
22
ConductorOne
ConductorOne
ConductorOne, a cloud-loving identity security platform, is user-friendly and easy to use. It makes access requests, access reviews and deprovisioning quick, secure, compliant, and easy. Cloud apps and infrastructure are great for productivity and collaboration. However, security and GRC teams find managing SaaS permissions and identities difficult and risky. This leads to painful audits, over-permissioned users, as well as increased risk of breaches. ConductorOne's identity platform offers seamless automation, a rich bench of integrations and a best-in-class experience to help manage the entire lifecycle of cloud access permissions and access. No more spreadsheets. No more manually extracting data from apps. No more manually pulling data from apps. Automate access reviews quickly and easily -
23
Avatier Identity Anywhere
Avatier
$5.00/one-time/ user Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time. -
24
Ilantus Compact Identity
Ilantus Technologies
It is the first time that an IAM solution is available that is comprehensive, deep, and easy to implement even by non-IT personnel. This includes Access Management, Identity Governance and Administration. You can implement the solution step by step and at your own pace with an online digital guidance system. Ilantus offers free implementation support, unlike other vendors. Seamless SSO with "no app left behind", including on-premise or thick-client apps. All web apps, whether they are federated, non federated or thick-client, legacy, custom, or other apps, will be included in your SSO environment. Support is also available for mobile apps and IOT devices. What is your homegrown app? This will not be a problem thanks to our interactive digital help guide. If you need help, you can call Ilantus' dedicated helpline, available 24 hours a day, Monday through Friday, and we will assist you with the integration. -
25
Netwrix Usercube
Netwrix
Identity Governance and Administration (IGA), a combination of all the processes within an organization, allows each identified individual to have the right access rights at the correct time and for the right reasons. The directory is powered through real-time movement, administrative tasks, and personal updates via the self-service screen. This ensures that the information is accurate at all times. People move frequently within organizations (hires and departures, subsidiary creations. Office closings. Reorganizations. Moves). The company's organization is modelled in Usercube so workflows can be sent to the appropriate people in real-time. This makes the actors more efficient and reduces wasted time. Easy generation of compliance reports is possible due to the easy access to the repository and the traceability for all requests. -
26
ManageEngine AD360
Zoho
$595.00 /year AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV. -
27
HelloID
Tools4ever
2.18/month/ user HelloID is a modern and secure cloud-based Identity & Access Management (IAM) solution that empowers educational institutions and organizations to take control of their complex user provisioning, self-service, and single sign-on needs. Automate the entire user lifecycle process with HelloID by connecting your HR or SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of Identity Management into your hands to meet your current and future needs. -
28
Core Security Access Assurance Suite
Core Security (Fortra)
Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets. -
29
SAP Cloud Identity Services allows you to successfully manage identity in cloud and hybrid environments. SAP Cloud Identity Services allows you to generate audit reports, and ensure compliance with corporate policies and laws. Improving security, compliance and system integration within cloud and hybrid environments. Secure data and system access while providing users with an SSO experience across your hybrid or cloud landscape. Use consistent mechanisms for user identification, user provisioning and role assignment. Use a central repository to manage all user accounts across a hybrid or cloud system landscape. Centralized capabilities such as SSO and secure authentication are available. Employees and partners can benefit from convenient self-services such as registration and password reset. Protect application access by defining authentication rules based on risk, two-factor authentication etc.
-
30
RapidIdentity
Identity Automation
Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs. -
31
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
32
Access Auditor
Security Compliance Corp
Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week. -
33
Fischer Identity
Fischer International Identity
Fischer helps organizations build a secure, predictable, and effective Global Identity®. Architecture. The number one priority is now to secure an Identity Program. Fischer Identity offers hardware and software solutions, as well as Global Identity®, Services to protect and control information technology resources. Our plug-and-play automation allows for predictable, secure provisioning that will provide your identities with the access they require on day one. You can also deprovision access as needed. Automating Fischer's way will eliminate the need for professional services. Our governance model gives you the control you need in order to ensure compliance throughout your business. You will always know who has what access, how they got it, and what you can do to correct any issues. -
34
AlertEnterprise
AlertEnterprise
AlertEnterprise provides a unified platform for cyber-physical security convergence by linking IT, OT, and Physical Security to prevent, detect, and mitigate risk. We help you eliminate security gaps, so that you can see all threats and vulnerabilities, and enhance your workforce's safety, data privacy, and experience. -
35
midPoint
Evolveum
Choose the best. Join hundreds of other organizations who have tried midPoint, the open source leader in Identity Governance and Administration. You can choose what works best for you: midPoint can be used on-premise, in the hybrid cloud, or in the cloud. Enhance your security and efficiency by synchronizing, policing, and identity management. MidPoint's outstanding accountability, record-keeping capabilities, and data protection scope will help you meet the regulations. Advanced privacy and data protection mechanisms allow users to take control of the personal data they have been given by organizations. Users can now access their data via self-service, reset passwords, and manage their profiles. This will enhance the digital experience. Enjoy the comfort and scalability that midPoint cloud offers. Third-party experts can be hired to manage the seamless operation. This will save you valuable time and human resource. Get the most from the synergy. -
36
Sentri
Sentri
Sentri is a secure security platform that combines information, technology, and infrastructure. You envisioned a product that is intuitive, smart, and applicable to all levels of users. To implement an identity solution within an organization to prevent cyber-attacks, it requires spending money on licensing, hardware, and other resources. SENTRI offers a cost-effective and efficient suite of access control and governance solutions. Sentri is a one-stop solution to all your access governance requirements. It allows organizations to manage their access rights and keep their data safe, both on Premise and Cloud. We are here for you to provide fast, seamless self-service and streamlined support to your satisfaction. Sentri is your one-stop solution for all your IAG (Identity Access Governance), IRM(Integrated Risk Management), and GRC (Governance Risk Compliance). -
37
Clarity Security
Clarity Security
Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove implementation takes the burden off team members, reducing the impact of other IT initiatives. Automated evidence gathering into a downloadable ledger reduces the need to waste time gathering spreadsheets and screenshots. Clarity Explorer and nested entitlements provide insights into what users are granted access to and why. Role-based access control and automated workflows aligned with your organization's structure and needs. Clarity is a powerful tool that allows you to upgrade your identity governance program quickly and adapt it seamlessly as your organization grows. Fast reviews to certify user access, entitlements and roles, application access and more. -
38
Identity Governance and Web Access Management You must ensure that new employees are granted access to all systems and resources necessary to their work. Access that is not necessary for the new position must also be revoked. It is essential that permissions are granted for users who leave the firm or are terminated. To avoid disgruntled users, access to sensitive data and applications must be disabled or removed promptly with traceability.
-
39
Cloud, hybrid and on-premises deployments all provide full identity governance and management (IGA). Robust governance capabilities assist in enforcing internal policies and mandates. Visibility and insights help identify risks, prioritize priorities, and recommend intervention. Automation and central management enhance operational efficiency. Integrate IGA into applications, systems and data in order to manage and secure identities at scale. Lifecycle capabilities control user permissions and accessibility throughout the entire joiner, mover, leaver lifecycle. A dynamic dashboarding system provides insights that help identify trends, measure effectiveness, and uncover risk. {Integrated gamification accelerates reviews, reduces audit cycles, and promotes better outcomes.|Integrated gamification speeds up reviews, reduces audit cycle lengths, and promotes improved outcomes.} RSA combines automated intelligence for identity, access, governance and lifecycle, as well as authentication and access. This helps to eliminate the blind spots and gaps that can result from combining solutions.
-
40
Rippling streamlines HR, payroll, IT, and spend management for global businesses. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration to performance. Automate HR tasks, simplify approvals, and ensure compliance. Manage devices, software access, and compliance monitoring all from one dashboard. Enjoy timely payroll, expense management, and dynamic financial policies, empowering you to save time, reduce costs, and enhance efficiency in your business. Experience the power of unified management with Rippling today.
-
41
Apono
Apono
Apono's cloud-native platform for access governance allows you to work faster, more securely, and more efficiently with self-service. It is designed for modern enterprises that run in the cloud. Context helps you discover who has access to which resources. Identify access risks by leveraging context and enriched identity from the cloud resource environment. Access guardrails can be enforced at scale. Apono suggests dynamic policies that are tailored to your business requirements, streamlining cloud access lifecycles and gaining control over cloud-privileged access. Apono AI detects shadow, unused and over-provisioned access that poses a high risk. Remove standing access in your cloud environment and prevent lateral movements. These high-level accounts can be subject to strict authentication, authorization and audit controls. This will reduce the risk of insider attacks, data breaches and unauthorized access. -
42
Systancia Identity
Systancia
Systancia Identity is a powerful management tool for your entire ecosystem's authorizations and identities. It can be used on-premise or in the cloud. Systancia Identity, previously Avencis Hpliance is an identity governance solution. It allows you to manage identities, their members organizations, authorizations, and possible their resources (endowments). Its Workflow module allows the management of many different use cases: flow of people, processes, authorization/resources request. It is equipped with an agile synchronization engine, which integrates easily into your downstream and upstream repositories. It provides permission certification and separation privileged duties (SoD) and allows visibility and traceability of actions via its auditing and reporting module. Systancia Identity is easy to use once you have set up the basic base. Users can then quickly adopt it. -
43
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
44
Deepnet DualShield
Deepnet Security
You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe. -
45
EmpowerID
EmpowerID
$2 per user per monthEmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business. -
46
Able+
New Era Education
Able+ is a digital identity and access management system that will help you deliver your organization's digital strategy. It is a managed service that can be used from either the public cloud or private or hybrid infrastructure. It is easy to use and streamlines identity governance. It also improves productivity and satisfaction of users by enabling secure single-sign-on to applications. -
47
Juniper Identity Management Service
Juniper Networks
Access to corporate data should be a top priority. Access to corporate data can be abused by insiders who have direct access. User access must be controlled and enforced across all levels of the organization, including mobile and cloud, to ensure the safety of corporate resources. Juniper Identity Management Service improves enterprise security by authenticating and restricting user access. It is the first line of defense for protecting corporate assets and preventing corporate breaches. Employees are identified and assigned corporate roles which determine what data and applications they can access. Juniper Identity Management Service seamlessly integrates to SRX Series next generation firewalls. This allows security teams to match user roles and application activity to security policies. It can then generate detailed user-metrics as well as audit reports for detailed reporting. -
48
MonoSign
MonoFor
$4/month/ user MonoSign is a complete Identity & Access Management Solution for Enterprise Level Companies. Get Universal Directory, Single-Sign-On, Adaptive Multi-Factor Authentication, Lifecycle Management, and many other features. MonoFor is here today with MonoSign, one of the most powerful and easy-to-deploy Identity & Access Management Software for enterprise-level companies. -
49
Cymmetri
Cymmetri
$2 per monthCymmetri manages and protects the entire identity ecosystem, from employees and partners to customers or privileged users. Control user access with ease, ensuring efficient and secure operations in the digital world. It provides seamless identity protection to safeguard individuals and organizations anywhere, anytime. Streamline the onboarding process for all new employees. Cymmetri experts are available to discuss your IAM needs or demonstrate the power of Cymmetri. Our solutions have measurable outcomes that demonstrate the positive and tangible effects on security, efficiency and overall performance. Implementing robust cybersecurity improves data protection and minimizes the risk of breaches or unauthorized access. Our solutions will boost productivity by empowering employees to thrive within a secure, efficient and safe work environment. Our innovative solutions and optimized process will help you to increase efficiency, streamline operations and save money. -
50
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.