Best Powertech Identity Manager for IBM i Alternatives in 2026
Find the top alternatives to Powertech Identity Manager for IBM i currently available. Compare ratings, reviews, pricing, and features of Powertech Identity Manager for IBM i alternatives in 2026. Slashdot lists the best Powertech Identity Manager for IBM i alternatives on the market that offer competing products that are similar to Powertech Identity Manager for IBM i. Sort through Powertech Identity Manager for IBM i alternatives below to make the best choice for your needs
-
1
SecurEnds
SecurEnds
SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations. -
2
Veriam brings access and subscription management together in a single, secure platform designed to simplify operations, reduce admin time, and improve security. From onboarding to offboarding, Veriam makes it easy to manage access permissions and subscription plans for customers, partners, and employees—all in one place. With Veriam, access permissions and subscription updates happen in real-time. When subscriptions are renewed, upgraded, or changed, access is automatically updated too—so customers always have the right access, without delays. This real-time synchronization means fewer support tickets and a better customer experience. Users only need one login to access products, subscriptions, and data from any organization using Veriam. No more juggling multiple logins or passwords—just a smooth, familiar experience every time they log in. Veriam offers self-service. Customers can update their own subscriptions, manage access, and change profile details without support. This reduces the load on support teams and gives users more control. Built with security and compliance in mind, Veriam follows industry standards, giving you confidence that customer data is handled securely. Try us out today!
-
3
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
4
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users. -
5
Anomalix
Anomalix
From the very first day, it is crucial to engage employees and eliminate obstacles to collaboration. Utilizing both real-time and historical data for access management can lower compliance expenses while empowering the workforce. Implementing a passwordless enterprise identity and access management system offers a secure way to manage employee lifecycle events, including joiners, movers, and leavers, ensuring the protection of sensitive information while granting the minimum necessary access for individuals to perform their roles effectively. It is important to detect any anomalous or suspicious behavior from users and entities to maintain security. Establishing precise and efficient job roles will allow for the allocation of appropriate access and information. An identity management solution should also be implemented for non-employee individuals and corporate assets to streamline processes. Enhancing collaboration across different organizational areas can lead to improved data quality and a decrease in issues. Additionally, creating a definitive source for all non-employee identities is essential. Conducting thorough due diligence concerning identity matters will further strengthen the security posture. Finally, it is vital to manage all identity lifecycle events for both individuals and assets, including engagement, changes, disengagement, and re-engagement, to ensure a comprehensive approach to identity management. -
6
Bravura Identity
Bravura Security
Bravura Identity offers a comprehensive solution for overseeing identities, groups, and security entitlements across various systems and applications. It guarantees users receive prompt access, ensures that entitlements align with business requirements, and facilitates the revocation of access when it is no longer necessary. Many users find themselves juggling an excessive number of login credentials, with individuals in large organizations typically needing to sign into 10 to 20 different internal systems. This complexity can lead to significant operational challenges. Bravura Identity effectively manages the entire lifecycle of identities, accounts, groups, and entitlements, incorporating automation that grants and revokes access based on changes identified in systems of record. The platform features a web portal for submitting access requests, updating profiles, and conducting certifications. It also provides complete lifecycle management for groups and roles within target systems and includes a workflow manager that allows for the invitation of individuals to approve requests, assess access, or accomplish specific tasks. Additionally, it enforces policies related to segregation of duties (SoD), role-based access control (RBAC), risk assessments, privacy measures, and more. Comprehensive reporting, dashboards, and analytics further enhance its usability, making it a robust solution for identity management. -
7
SIVIS Identity Manager
SIVIS
Managing a large number of identities and permissions can require significant effort, particularly when employees have to handle these tasks manually. By utilizing an effective IAM (Identity and Access Management) tool, the burden on your staff can be significantly reduced. The SIVIS Identity Manager streamlines and automates the processes of user registration, access control, and approval workflows. Its well-defined workflows enable straightforward implementation within intricate system environments. With SIVIS, mass changes can be executed seamlessly, allowing for the swift addition or deletion of attributes, such as roles, for multiple users in the target system. Additionally, the SIVIS Identity Manager provides a robust authorization framework, ensuring transparency and accountability throughout administration. You also have the ability to establish a custom approval strategy, which can incorporate a two-person verification rule, enhancing security and compliance even further. This comprehensive approach not only simplifies administration but also enhances the overall efficiency of managing access rights. -
8
OpenText IAM
OpenText
Digital transformation offers numerous efficiencies and avenues for value generation; however, it also introduces significant challenges, particularly in ensuring secure information access both internally and externally. IT departments are tasked with regulating user access to various applications, whether they are internal or cloud-based, for employees, customers, and trading partners alike. In today's digital economy, every individual, system, and device requires a unique digital identity. The OpenText Identity and Access Management (IAM) Platform provides enterprises with the tools necessary to oversee all digital identities seeking access to their systems and applications. By implementing OpenText IAM, organizations can achieve manageable, governable, and visible information access. This solution not only creates and administers user accounts, roles, and access rights for individual users, but also encompasses systems and devices. The most effective IAM solutions seamlessly manage both employee identities within an organization and those across a broader business ecosystem of customers and partners. Furthermore, IAM plays a crucial role in overseeing the identities of IoT devices, ensuring their secure integration into the digital landscape. As the demand for digital interactions grows, so too does the importance of robust identity and access management. -
9
Youzer
YOUZER
This unique user repository provides information about the arrivals and departures for employees, temporary workers, service providers, and others. In real-time. You can launch account suspension/creation actions with packages you have created. Youzer connects with all your applications to monitor and analyse all access accounts. Regularly verify the alignment of each employee’s authorisations. Everyone has the right to access what they need. Regular analysis of accounts that are missing authorizations, inconsistent authorisations, access rights, sensitive security groups, and other issues is necessary. A sales person, a technician, a consultant... The profile of the user that arrives will determine which account needs to be created. You can create the right accounts for the right people with the resource packages. -
10
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
11
Identity Governance and Web Access Management You must ensure that new employees are granted access to all systems and resources necessary to their work. Access that is not necessary for the new position must also be revoked. It is essential that permissions are granted for users who leave the firm or are terminated. To avoid disgruntled users, access to sensitive data and applications must be disabled or removed promptly with traceability.
-
12
Jamf Connect
Jamf
$2 per user per month 1 RatingOrganizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements. -
13
Microsoft Entra
Microsoft
Confidently facilitate smarter, immediate access decisions for all identities across various hybrid and multicloud environments. Protect your organization by securing access to every application and resource for each user. Effectively safeguard every identity, including employees, customers, partners, applications, devices, and workloads, across all settings. Identify and adjust permissions, manage access lifecycles, and guarantee least privilege access for any identity type. Maintain user productivity with seamless sign-in processes, intelligent security features, and centralized administration. Strengthen your organization with an identity and access management solution that links individuals to their applications, devices, and data. Explore, address, and oversee permission risks throughout your multicloud infrastructure using a cloud infrastructure entitlement management (CIEM) solution. Additionally, create, issue, and validate privacy-focused decentralized identity credentials with an identity verification solution, ensuring comprehensive security and user trust. This holistic approach to identity management not only enhances security but also fosters a culture of accountability and transparency within your organization. -
14
Granting excessive system access to inappropriate users can result in severe data damage and loss. To mitigate this risk, it is advisable to utilize privileged access management software. Powertech Authority Broker for IBM i ensures the protection of corporate resources and monitors user access continuously to enhance system security. While security best practices suggest minimizing the number of privileged accounts, having an excessive number of user profiles with elevated permissions remains a prevalent security vulnerability identified during IBM i audits. It is important to provide users with the necessary access required for their roles, without overextending their privileges. Additionally, it is crucial to maintain comprehensive records of all user actions when they activate a privileged profile. With its award-winning screen capture technology, Powertech Authority Broker for IBM i offers system administrators and IT leaders an exceptional perspective on user activities, thereby fortifying the protection of sensitive IBM i information. As such, investing in this tool not only improves security but also ensures compliance with best practices in user management.
-
15
RadiantOne
Radiant Logic
Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes. -
16
Arnica UnifiedLogon
Arnica Software
Arnica UnifiedLogon serves as a comprehensive identity management solution that facilitates access control, personalization, and configuration services, enabling seamless single-point user log-in across various applications. This robust platform excels in efficiently managing detailed user access to applications, their resources, and functionalities, all through an intuitive web interface. Designed for scalability, Arnica UnifiedLogon can accommodate a wide range of user bases, whether it's a small organization with just a handful of local users or a vast enterprise with thousands, extending even to millions of users on public websites. Furthermore, the system offers multiple methods for maintaining and enhancing user profile data, allowing for an intricate level of complexity that can adapt to diverse organizational needs. This flexibility makes Arnica UnifiedLogon an invaluable asset for any entity looking to streamline its identity management processes. -
17
Juniper Identity Management Service
Juniper Networks
Ensuring the protection of corporate data ranks as one of the highest priorities in security management. Insiders who have direct access to sensitive information can easily exploit inadequate user controls. To effectively safeguard corporate resources, it is essential to implement and enforce user access policies across all platforms, including enterprise systems, mobile devices, and cloud environments. The Juniper Identity Management Service plays a vital role in enhancing enterprise security by authenticating users and regulating their access. Acting as the primary barrier against corporate breaches, it helps to protect valuable assets. Employees are clearly identified and assigned specific corporate roles, which dictate their access to various applications and data. This service works seamlessly with SRX Series next-generation firewalls, allowing security teams to align application activities and security policies with the designated user roles. Furthermore, it can produce comprehensive user metrics and audit reports, providing in-depth insights for reporting and analysis. By implementing such a system, organizations can significantly reduce security risks and enhance their overall security posture. -
18
AuthStack
Buckhill
€41.25 per monthAuthStack is a robust, enterprise-level Single Sign-On (SSO) and Identity Access Management (IAM) solution that can be hosted anywhere. It efficiently manages user logins not only for your own websites and applications but also for third-party platforms, simplifying the process by allowing users to authenticate just once with a single password and profile. Instead of juggling numerous logins for different services, AuthStack streamlines user identity management into a singular experience. For those whose websites or applications support SAML, integrating with AuthStack is straightforward and requires no custom development. In cases where SAML support is absent, a complimentary Connector Framework is available, and assistance with integration can be provided if needed. Additionally, transitioning to AuthStack does not necessitate migrating your current user databases, as the Connector Framework can seamlessly interface with various data sources, including LDAP, MySQL, SOAP, and REST APIs, to verify credentials against existing user records. This means you can enhance security and user convenience without overhauling your existing systems. -
19
Huawei IAM
Huawei Cloud
Establish IAM users and groups while granting them specific permissions through the use of policies and roles to control access to designated services and resources. You can allow a trusted HUAWEI CLOUD account or a cloud service to access your resources according to the permissions that have been assigned. Furthermore, create a trust relationship between your current identity system and HUAWEI CLOUD by implementing a SAML-based or OpenID Connect-based identity provider, or by utilizing a custom identity broker. This setup enables users within your organization to log in to HUAWEI CLOUD seamlessly via single sign-on (SSO). Additionally, you may require IAM users to undergo identity verification each time they log in or engage in significant activities to enhance security. The IAM service empowers you to create users and authorize secure resource access via their unique usernames and passwords, while also enabling the authorization of another HUAWEI CLOUD account or a cloud service to utilize your resources under the defined permissions. In doing so, you ensure a robust and secure management of access to your cloud resources. -
20
Deep Identity
Deep Identity
Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc -
21
bi-Cube Identity Access Management
OEDIV SecuSys
In the diverse IT landscape of modern organizations, managing employee data, accounts, and access permissions is a critical challenge. This raises the important question of who is authorized to perform specific actions, at what times, and within which environments. Every individual, whether an internal team member or an external consultant, must possess tailored access rights that align with their job responsibilities or roles. These permissions should ideally be granted upon hiring and automatically revoked when an employee departs from the organization. A robust Identity Access Management (IAM) system effectively manages these permissions through meticulous role-based access control, integrates seamlessly with existing infrastructures, ensures compliance and security through traceability, and can lead to significant reductions in IT costs, particularly by automating processes within systems like Active Directory. Furthermore, an efficient IAM system not only streamlines access management but also enhances overall organizational security by minimizing the risk of unauthorized access. -
22
Ireckonu
Ireckonu
Ireckonu facilitates connections with your guests, ensuring that every interaction is smooth and impactful, extending from the moments leading up to check-in all the way through to after they check out. This is the reason our interconnected ecosystem is meticulously crafted to oversee your operations and systems while empowering your staff, enabling you to tailor experiences that cater to the specific preferences of each guest in every room. With features ranging from guest profiling and analytics to on-the-spot assistance for hotel staff, our ecosystem revolves around the CORE, delivering genuinely unique experiences for your guests. The CORE middleware integrates your systems seamlessly as you adopt new technologies, creating an environment that collaborates effectively to not only meet but exceed guests' expectations. You will gain deep insights into what drives your guests, ensuring they return for more stays in the future. Additionally, our robust integration with Auth0 has allowed us to decouple identity management from a guest’s profile, which empowers hoteliers to implement single sign-on (SSO) and multi-factor authentication, enhancing security while simplifying access for guests. As a result, both the guest experience and operational efficiency are significantly enhanced. -
23
ARCON | IDAM
ARCON
ARCON | IDAM offers a comprehensive solution that effectively manages and maintains the complete employment history of each employee through a centralized console. This streamlined approach enables administrators to execute access certifications and monitor activities with significantly improved speed and efficiency. Moreover, end users experience minimal delays in obtaining authorized access to essential business applications, legacy systems, or IT infrastructure devices. By fostering a digital identity for every employee from their onboarding to their departure, organizations can enhance the digital experience in the workplace, ultimately leading to quicker development and deployment cycles. Additionally, the cumbersome wait for support responses is eliminated, as administrative tasks related to adding, removing, and updating user credentials have been simplified. This innovation not only reduces the frequency of help desk inquiries concerning password changes and access requests but also leads to a marked decrease in the overall cost of ownership for the organization. In this way, ARCON | IDAM not only boosts operational efficiency but also contributes to a more agile and responsive workplace environment. -
24
PowerSyncPro
PowerSyncPro
$13.50/year/ device PowerSyncPro serves as a powerful tool for directory synchronization and workstation migration, aiding IT teams in the synchronization, migration, and management of identity data across various directory services, such as on-premises Active Directory, Azure Active Directory (Entra ID), and hybrid setups, all while requiring minimal scripting or manual effort. Its DirSync feature ensures users, groups, and contacts can be synced effortlessly between directories, facilitating bi-directional password synchronization, SID history management, and cross-tenant operations, which is particularly beneficial during organizational changes like mergers, acquisitions, and IT upgrades, as it prevents extended downtimes and avoids complex tools. The software employs a central "metaverse" architecture to effectively import and analyze directory data, execute customizable synchronization protocols, and implement changes uniformly, streamlining the configuration process with pre-populated templates and rule-based controls that minimize errors during extensive migrations. Furthermore, this approach not only enhances operational efficiency but also empowers IT teams to maintain a cohesive identity management strategy across diverse environments. -
25
Lumos
Lumos
Lumos serves as a company's internal AppStore, streamlining access requests, reviews, and license management through a self-service platform. By automating access requests, approvals, and provisioning, organizations can significantly reduce the number of support tickets they receive. This not only enhances visibility into all SaaS applications and associated spending but also facilitates the removal of unused licenses through automated workflows. As businesses expand their workforce and adapt to remote working conditions, the influx of help desk tickets related to app access and permission requests can become overwhelming. With Lumos, you can manage permissions and approve access durations directly within Slack, ensuring a smoother process. Prior to a new hire's start date, Lumos will alert their manager and assist in setting up all necessary applications for them. It’s important to recognize that not all employees require access to every application; therefore, Lumos allows you to customize the AppStore according to specific employee roles, helping to streamline operations and minimize potential complications. By implementing Lumos, organizations can enhance efficiency and focus on what truly matters—driving success. -
26
Keep a close watch on your IBM i for vital security incidents and get instant notifications, enabling you to act swiftly—before essential business data is lost, damaged, or compromised. Directly relay security-related incidents to your enterprise security monitor for enhanced oversight. By integrating with your security information and event management (SIEM) system, Powertech SIEM Agent streamlines and consolidates monitoring of security and integrity. You can oversee security events from the network, operating system, and any journal or message queue in real-time, tracking user profile alterations, system value changes, unauthorized login attempts, intrusion alerts, and modifications or deletions of objects. Stay informed about every security event on your system in real-time, ensuring you never overlook a potential security threat. With Powertech SIEM Agent for IBM i, you will receive timely alerts to highlight critical issues and facilitate a rapid response. This comprehensive monitoring approach not only enhances your security posture but also helps maintain the integrity of your business operations.
-
27
Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
-
28
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
29
GoProfiles
GoProfiles
$99 a month for 25 usersGoProfiles, from the makers of GoLinks, is a dynamic employee directory and peer recognition platform tailored for the modern workplace. Teams using GoProfiles can celebrate achievements, strengthen bonds, and enhance collaboration. The platform goes beyond traditional directories, offering rich employee profiles showcasing personalities and accomplishments. An interactive map fosters connections among local teammates, while a comprehensive team directory and org chart unveil internal relationships. Peer recognition, facilitated by Bravos, ensures that accomplishments receive the attention they deserve. Powered by genAI, GoProfiles enables teams to get acquainted with peers through questions like 'Tell me about John' or 'Who was recently hired in California?' The AI provides insights from employee bios, locations, and more. Cultivate a culture of appreciation by spotlighting daily achievements, not just during reviews. Celebrate milestones and growth with a central hub for new hires, anniversaries, birthdays, and recognition. GoProfiles transforms the workplace into an environment that values and acknowledges its members. -
30
Active Roles
One Identity
Streamline your identity management and security by gaining visibility into all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from one comprehensive interface. This approach allows for the implementation of fine-tuned privileged access for users and objects precisely when necessary through dynamic delegation across your identity framework. By automating tedious processes, you can enhance efficiency and security while expediting the management of accounts, groups, and directories. Our Microsoft solution facilitates the centralized management of all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants within a single dashboard. Additionally, it allows for the control of access and permissions through dynamic rules, group families, and automated policies. You can efficiently manage users, groups, roles, contacts, Microsoft 365 licenses, and other objects using customizable scripts and configurable workflows. Furthermore, the integration of Active Roles with AWS Directory Service supports a zero-trust least privilege model, ensuring secure access delegation and synchronized user data from on-premises environments. This comprehensive management system not only simplifies operations but also enhances your overall security posture. -
31
Consolidate your multi-vendor infrastructure into a unified security domain. The Core Privileged Access Manager (BoKS) revolutionizes your multi-vendor Linux and UNIX server landscape by creating a centrally managed security domain. This transformation streamlines your organization's capability to implement security policies and manage access to essential systems and data. By providing comprehensive control over accounts, access, and privileges, IT and security teams can effectively thwart both internal and external threats to critical systems before they manifest. Centralized management of user accounts and profiles leads to easier administration and enhanced scalability. Safeguard your systems by regulating user privileges and access to sensitive information, all while maintaining high productivity levels. Grant users only the access necessary for their roles and uphold the principle of least privilege throughout your hybrid environment, ensuring robust security measures are in place. This proactive approach not only fortifies your defenses but also fosters a culture of security compliance within your organization.
-
32
midPoint
Evolveum
Opt for excellence by joining the multitude of organizations that have embraced midPoint, the leading open-source platform in Identity Governance and Administration. Select the deployment method that suits your needs best: whether in the cloud, hybrid cloud, or on-premise, midPoint offers flexibility. Boost your security and operational efficiency with improved visibility, compliance enforcement, synchronization, and identity oversight. Fulfill regulatory demands effortlessly thanks to midPoint’s robust accountability features, meticulous record-keeping, and comprehensive data protection capabilities. Empower users by giving them control over their personal data through advanced privacy measures and data protection protocols. Improve the user digital experience by allowing them to manage self-service access requests, reset passwords, and edit profiles with ease. Experience the benefits of scalability and convenience that midPoint in the cloud provides, ensuring your organization can grow without constraints. By utilizing third-party specialists for seamless operations, you can save precious time and human resources, allowing your team to focus on strategic initiatives. Harness the full potential of synergy and elevate your organization's identity management to new heights. -
33
Employee Directory
Beyond Intranet
Our Employee Directory offers a simple user interface that allows employees to quickly find out the name, email, role, and other details of their colleagues. Employee Directory allows an organization to customize the information displayed about employees, such as their name, email, and phone number. It also includes communication features and advanced search capabilities. It's easy to check the details of a colleague Customisable employee profiles One-click communication Advanced Sort & Filter Option Multi-language support Integration with Microsoft Teams Scalable and customizable Built on Microsoft SharePoint - Add value to Employee Directory for free! Org Chart Birthday and Anniversary Reminder Mobile Application -
34
Sequretek Percept IGA
Sequretek
IGA: Comprehensive Identity & Access Management Throughout the Employee Lifecycle. Sequretek Percept IGA, the leading industry solution for comprehensive access management and identity management throughout the lifecycle of employees within an organization, is the leading offering in the industry. The big data platform builds context and provides insights to access decisions for users who access assets with both structured and unstructured information. This helps organizations reduce the risk and improve policy enforcement. Most enterprises require User Access Recertification to comply with regulations. Percept IGA provides UAR for applications, departments, and organizations. This is a fully automated process that can be run as a scheduled campaign or as ad-hoc policy. -
35
Visual Guard
Novalys
1.55/month/ user Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions, User management : Create, modify & delete user accounts Integrate with LDAP or Active Directory directories Automatic synchronization of user information Access control : Fine-grained access rights to features and resources Permission and Role Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed logs Historical & Real-time Graphs Integration: Compatibility with major development platforms, frameworks, and protocols. APIs for integration of authentication and authorization features into custom applications Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management. -
36
Hyperfish
Hyperfish
Hyperfish ensures that profile information remains accurate and current within Office 365 and the contemporary workplace. By revitalizing your company directory, Hyperfish guarantees that all directory and profile details are consistently complete and timely. This tool enhances IT service efficiency, boosts employee involvement, and maximizes the benefits of your technological investments. Hyperfish identifies gaps or inaccuracies and initiates conversations with employees to gather and confirm their information effectively. Using advanced AI and bot technologies, it streamlines the process of collecting profile data. The platform offers secure support for on-premises, hybrid, and cloud-based environments. Additionally, Hyperfish monitors Active Directory to pinpoint missing or erroneous information, subsequently notifying users via email or chatbots. Employees can conveniently update their details through both desktop and mobile devices. By automatically reaching out to users based on identified discrepancies, Hyperfish ensures that profile updates are conducted seamlessly and efficiently. This proactive approach not only saves time but also fosters a culture of accurate data management within the organization. -
37
ProcessFlex
ProcessFlex
$5.40 per user, per monthA comprehensive system for managing processes and profiles encompasses recruitment, hiring, quotations, purchasing, sales, projects, and other essential operations. It caters to a diverse range of entities, including customers, candidates, suppliers, and employees. Users have the flexibility to either utilize existing processes or develop new ones as necessary. With a powerful configurator at your disposal, you can easily modify and tailor each process type to fit your organization’s specific needs. This includes setting statuses, designating participants, receiving documents, sending messages, and assembling teams efficiently. Additionally, you can create and customize profiles for candidates, customers, suppliers, employees, and any other relevant individuals, with the option to adjust settings as required. Unique links can be generated for direct registration by any profile owner, whether they are a candidate, customer, or supplier. If your organization has specialized requirements that standard solutions do not address, reach out to discuss how we can collaborate to find the most effective solution tailored just for you. Your company’s individuality deserves a custom approach. -
38
Sentinel
Sentinel Software
$600 per monthStreamlined PeopleSoft Security Management. Everything required for effortless security management and auditing is at your fingertips. Quickly pinpoint absent objects and discrepancies in security across different PeopleSoft environments. Conduct side-by-side evaluations of PeopleSoft objects and their security authorizations. Gain insights into the objects that are missing, newly added, or removed when transferring Roles and Permission Lists to another environment. Sentinel has empowered its clients to enhance their security measures while cutting down on both support time and expenses. Effectively oversee security for Users, Roles, and Permission Lists with precision. Navigate through any menu to uncover the Roles that grant user access. Construct precise Roles and Permission Lists in a significantly reduced timeframe, utilizing a menu without the hassle of searching for components. Additionally, manage data masking for PII/PCI fields directly within the user's profile, ensuring compliance and security are maintained effortlessly. This comprehensive approach allows for improved oversight and control in managing security aspects. -
39
DruID
DruID
Building intelligent relationships centered around consumer identity is crucial for fostering lasting connections. Effectively managing distinct consumer identities is essential for long-term engagement. DRUID is a powerful tool designed to enhance your digital ecosystem by integrating, consolidating user data, and personalizing experiences to delight your audience. So, what exactly is DRUID? It serves as a comprehensive platform for consumer identity and access management (CIAM), enabling seamless integration across complex digital landscapes with remarkable adaptability. With DRUID, you can dynamically oversee all interaction points while ensuring compliance with data protection regulations and enriching consumer profiles through external data sources, including social media platforms. As a cornerstone of your consumer-centric approach, DRUID is instrumental in helping you achieve a singular consumer identity, gaining deeper insights into your target demographics—including consumers, stakeholders, customers, influencers, and employees. By following a three-step process—Integrate, Align, and Engage—you can effectively deploy a successful consumer strategy with DRUID at its core. This platform not only streamlines operations but also enhances customer relationships, driving business growth and innovation. -
40
Talenox
Talenox
Talenox self-service software for HR. A HR experience that is designed for people and not for personnel. Excel is gone. All the latest updates at a glance All your employee information, including payroll and absence statuses, can be accessed from one location. Onboarding in 1,2,3. Our HR apps are intuitive and user-friendly. It's easy to use, and easy on the eyes. Country-specific. Talenox is updated with all the latest labor laws and stipulations for your country. No need to have any previous experience. Use Talenox's self service apps immediately after signing up. Our in-app messaging support allows you to ask us anything. Profiles You can view and edit your company information and employees quickly and easily from a central place/dashboard. You can immediately join your company. In minutes, you can set up your company in our HR system. The Profiles app will guide you through the process of importing employee information. Or, you can manually enter the details. This is the easiest way to generate paychecks and run payroll. -
41
Mac Terminal
Apple
FreeWhen connecting to several servers, utilizing distinct background colors and window titles featured in profiles can significantly aid in quickly identifying the right terminal window. You have the option to use the pre-existing profiles available in Terminal or design your own personalized profiles. As you progress through your tasks, you can incorporate markup and bookmarks to facilitate swift navigation across the extensive output displayed in the terminal window. The inspector tool can be utilized to monitor and manage ongoing processes, while also allowing adjustments to window titles and background colors. Customization of profiles enables alterations to various aspects such as colors, font styles, cursor appearance, backgrounds, and additional elements of Terminal windows. Each profile serves as a comprehensive collection of style and behavior settings tailored for a terminal window. Although Terminal includes a variety of predefined profiles, it also provides the flexibility to create unique profiles that suit your preferences. Furthermore, you can modify settings related to terminal type, input methods, prompt behavior, and international encodings, as well as adjust configurations for function keys, the option key, and the alternate display options. This level of customization ensures that your terminal experience is both efficient and tailored to your specific workflow needs. -
42
Garancy IAM Suite
Beta Systems Software
A leading identity management solution tailored for agile enterprises. The contemporary landscape of identity management faces significant challenges due to the ever-evolving nature of business operations across various sectors. The IT environment continuously experiences transformations and expansions concerning software and systems. Stricter regulations and rigorous audits heavily influence compliance issues, making it essential for organizations to adapt. Additionally, the roles and types of users are in constant flux. Today's corporate environment is marked by frequent reorganizations, mergers, and global initiatives, necessitating that companies maintain adaptable structures capable of managing such rapid changes. Moreover, the demands of the market require solutions that facilitate digital transformation and advancements associated with Industry 4.0. Beta Systems' identity and access management solutions provide unparalleled adaptability for these dynamic organizations, ensuring comprehensive compliance by merging governance and provisioning within a single IAM framework. This integrated approach empowers businesses to navigate the complexities of modern identity management with confidence. -
43
Access Auditor
Security Compliance Corp
Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week. -
44
Quicklaunch
Quicklaunch
$0.73 per month 1 RatingIt makes it easier for employees and students to access the apps they need to learn or work. Students and employees can reset their passwords at any time, which reduces the need for IT help. Increases cyber security by protecting user accounts against hacking and thwarting ransomware, phishing cyber attacks. -
45
Azure-AD-External-Identities
Microsoft
$0.00325 per monthAzure Active Directory External Identities, which is a component of Microsoft Entra, delivers secure digital interactions for external users such as partners, customers, citizens, and patients, while offering customizable controls. By unifying external identities and user directories within a single portal, organizations can effortlessly oversee access management. This enables both onsite and remote staff to enjoy uninterrupted access to their applications, ensuring productivity regardless of their location. Additionally, automating workflows streamlines user lifecycle management and provisioning processes. By implementing self-service identity management for external users, organizations can conserve administrative time and resources. Moreover, access to thousands of pre-integrated Software as a Service (SaaS) applications is simplified through single sign-on capabilities, allowing users to connect from any device, anywhere. This holistic approach not only enhances security but also improves the overall user experience significantly.