Best RapidIdentity Alternatives in 2024
Find the top alternatives to RapidIdentity currently available. Compare ratings, reviews, pricing, and features of RapidIdentity alternatives in 2024. Slashdot lists the best RapidIdentity alternatives on the market that offer competing products that are similar to RapidIdentity. Sort through RapidIdentity alternatives below to make the best choice for your needs
-
1
Cisco Duo
Cisco
1,285 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Auth0
Okta
809 RatingsAuth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO. -
3
ManageEngine ADManager Plus
ManageEngine
471 RatingsADManager Plus is an easy-to use Windows Active Directory (AD), management and reporting solution that aids AD administrators and help desk personnel in their day to day activities. The software has a web-based GUI that is intuitive and central. It handles complex tasks such as bulk management of user accounts, other AD objects, and delegate role-based access for help desk technicians. It also generates a comprehensive list of AD reports, which are essential to satisfy compliance audits. The Active Directory tool also includes mobile AD apps that enable AD technicians and administrators to perform user management tasks on the go, right from their mobile devices. -
4
SecurEnds
SecurEnds
SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations. -
5
Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
-
6
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
7
Sonrai Security
Sonraí Security
Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups. -
8
Quicklaunch
Quicklaunch
$0.73 per month 1 RatingIt makes it easier for employees and students to access the apps they need to learn or work. Students and employees can reset their passwords at any time, which reduces the need for IT help. Increases cyber security by protecting user accounts against hacking and thwarting ransomware, phishing cyber attacks. -
9
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
10
GateKeeper Proximity Password Manager
Untethered Labs
$3/user/ month Proximity-based passwordless login for desktop applications, Macs, websites, PCs, Macs and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords, enforce 2FA and give employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password changes will be reduced. Login to enable auto-lock and presence detection -
11
Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
-
12
Fischer Identity
Fischer International Identity
Fischer helps organizations build a secure, predictable, and effective Global Identity®. Architecture. The number one priority is now to secure an Identity Program. Fischer Identity offers hardware and software solutions, as well as Global Identity®, Services to protect and control information technology resources. Our plug-and-play automation allows for predictable, secure provisioning that will provide your identities with the access they require on day one. You can also deprovision access as needed. Automating Fischer's way will eliminate the need for professional services. Our governance model gives you the control you need in order to ensure compliance throughout your business. You will always know who has what access, how they got it, and what you can do to correct any issues. -
13
Oracle Identity Management
Oracle
Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform. -
14
ManageEngine AD360
Zoho
$595.00 /year AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV. -
15
Symantec IGA
Broadcom
Although user experience and instantaneous access have become the norm, the IT infrastructure supporting these efforts has grown exponentially more complex. IT organizations are under constant pressure to reduce operational costs while still complying with increasing numbers of industry and government regulations. IT organizations must allow more people to access different applications in a shorter time span, while still being accountable to a multitude of parties who control access. Identity governance and administration technologies today must be able provide broad provisioning support for both on-premises as well as cloud apps. They also need entitlements certification to verify that privileges are appropriate. All this while scaling to store millions. -
16
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
17
Omada Identity Suite
Omada
Omada, a leading IGA provider, offers Omada Identity Cloud, a cloud-native SaaS platform that secures digital identities in complex environments. This AI-powered solution automates identity management and leverages advanced analytics to suggest optimal role structures, boosting efficiency and security. Omada Identity Cloud scales seamlessly and integrates effortlessly with other cloud services. Its API-first design facilitates easy connection to existing IT infrastructure and third-party applications. Additionally, the platform employs risk-based access governance with real-time predictive analytics to mitigate access risks. Omada offers configurable workflows that align with an organization's policies. It simplifies compliance management with pre-built reports and continuous monitoring ensures adherence to regulations. With Omada, organizations can effectively manage modern identity challenges, ensuring the right people have the right access to the right resources at the right time. -
18
Core Security Access Assurance Suite
Core Security (Fortra)
Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets. -
19
OpenText NetIQ Identity Manager
OpenText
Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority. -
20
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
21
MonoSign
MonoFor
$4/month/ user MonoSign is a complete Identity & Access Management Solution for Enterprise Level Companies. Get Universal Directory, Single-Sign-On, Adaptive Multi-Factor Authentication, Lifecycle Management, and many other features. MonoFor is here today with MonoSign, one of the most powerful and easy-to-deploy Identity & Access Management Software for enterprise-level companies. -
22
One Identity
Quest Software
Enterprise identity and access management can be simplified. You can reduce risk, secure data and comply with compliance by allowing your users access only to the data and applications they require. Identity and access management (IAM), can now be driven by business requirements, not IT capabilities. Identity Manager allows you to unify information security policies, and meet governance requirements -- both today and in the future. -
23
ForgeRock
ForgeRock
The only AI-driven platform that combines all aspects of identity, governance and access management to dramatically improve and scale, it is the only one in the industry. Digital access is essential for our personal, professional, and educational lives. It is essential to accelerate digital transformation, provide superior experiences, and ensure the highest level of security in order to meet customer demand and keep up with our competitors. ForgeRock helps people connect to the world safely and easily by helping organizations improve and scale their identity, governance and access management. ForgeRock is the only AI-driven platform that offers a full suite of AI-driven solutions. It is designed for all types of identities (consumers and workers, as well as things). ForgeRock's simple-to-use, comprehensive solutions will help you increase revenue, manage risk, increase workforce productivity, and lower costs. -
24
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
25
SlashID
SlashID
Identity is a common vector of lateral movement and data breaches. SlashID helps build a compliant, secure, and scalable infrastructure for identity. Manage the creation, rotation, and deletion of identities and secret in one place. Multi-cloud inventory of all identities and secrets. Detect initial access, privilege elevation, and lateral movements across your IdPs, cloud environments. Add authentication, authorization and conditional access to your services. Rotate key materials to detect leaks in real-time. This will prevent data breaches. To reduce the impact of an attacker, you can automatically block, suspend or rotate MFA based on a detection. Add MFA and conditional accessibility to your applications. Add authentication, authorization and credential tokenization to your APIs and workloads. -
26
ConductorOne
ConductorOne
ConductorOne, a cloud-loving identity security platform, is user-friendly and easy to use. It makes access requests, access reviews and deprovisioning quick, secure, compliant, and easy. Cloud apps and infrastructure are great for productivity and collaboration. However, security and GRC teams find managing SaaS permissions and identities difficult and risky. This leads to painful audits, over-permissioned users, as well as increased risk of breaches. ConductorOne's identity platform offers seamless automation, a rich bench of integrations and a best-in-class experience to help manage the entire lifecycle of cloud access permissions and access. No more spreadsheets. No more manually extracting data from apps. No more manually pulling data from apps. Automate access reviews quickly and easily -
27
Deep Identity
Deep Identity
Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc -
28
Zilla Security
Zilla Security
Zilla provides security teams with the visibility and automation they need to ensure your cloud applications are compliant and secure. Zilla will ensure that your application security settings, permissions, and API-based integrations do not leak critical data. An ever-expanding cloud footprint has created a vast array of data interactions. Automated access reviews are essential for ensuring that API-based integrations and users have the right access. Access compliance is no longer possible with labor-intensive spreadsheets or complicated identity governance products that require expensive professional services. Automated collectors make it easy to pull in permission data from all your cloud and on-premises systems, as needed. -
29
Bravura Identity
Bravura Security
Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access. -
30
Visual Identity Suite
Core Security (Fortra)
Visual Identity Suite (VIS), previously offered by Courion as part of its Core Security Identity Governance and Administration portfolio, empowers organizations to view user privileges and access certificates in a new way. It uses an intelligent, visual-first approach. You can quickly identify outliers and see common user entitlements using an intuitive graphical interface. This allows you to quickly identify the right people to access what information. VIS allows you to see what access looks like within your business so that you can manage identity chaos and mitigate identity risk. Intelligent and visible identity governance across all your environments is essential for reducing identity risk within your organization. To simplify your identity governance and administration, you should use a visual-first approach to the creation and management access reviews and roles. -
31
Clear Skye IGA
Clear Skye
Organizations need to understand and manage who has access to what across their entire IT ecosystem: cloud and on-premises application stack, infrastructure, DevOps pipelines. This is important for both external (regulatory compliance) and internal (security and risk management, employee experience and productivity) reasons. Legacy identity solutions have not met the needs of modern organizations with over 50% of Identity Governance programs being in distress and more than 75% looking to replace their current solution (Source: Gartner). They are unable to keep pace with shifts in business due to digital transformation and the rise of the business platform. Clear Skye, the only identity governance and security solution built natively on ServiceNow, optimizes enterprise identity and risk management with a platform-first approach. The company provides workflow management, access requests, access review, and identity lifecycle management tools to a broad set of vertical markets. By leveraging an existing business platform, Clear Skye enables customers to reduce friction and IT hurdles, while improving workflows and user experience. -
32
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications. -
33
Avatier Identity Anywhere
Avatier
$5.00/one-time/ user Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time. -
34
Netwrix GroupID
Netwrix
The user accounts and group in your Active Directory (formerly Azure AD), and Microsoft Entra ID, provide access to sensitive data and systems. But managing groups and users manually can be a major drain on your IT resources, and it often leads to mistakes that lead to security vulnerabilities. Netwrix GroupID automates group and user management, allowing you to maintain your directories and increase IT productivity. Create queries to dynamically determine group membership by analyzing the attributes of users. As well, any attribute changes to a parent groups are automatically reflected in the child groups. By synchronizing data from a reliable source, such as your HRIS system, you can automatically provision and deprovision accounts. Sync changes across identity stores and groups in near-real time, without a third-party connector. -
35
Rippling streamlines HR, payroll, IT, and spend management for global businesses. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration to performance. Automate HR tasks, simplify approvals, and ensure compliance. Manage devices, software access, and compliance monitoring all from one dashboard. Enjoy timely payroll, expense management, and dynamic financial policies, empowering you to save time, reduce costs, and enhance efficiency in your business. Experience the power of unified management with Rippling today.
-
36
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
37
Simeio
Simeio
Simeio offers the best Identity and Access Management (IAM), which engages securely with anyone, anywhere and anytime with an unmatched "service first" philosophy. We can help you protect your customers, partners, and employees identities. Our job is to make access easy, reliable, and secure, wherever you are, in all areas of banking, hospitality and healthcare, as well as government and universities. We can also protect your brand reputation by protecting identities. To create a platform of exceptional reliability and security, we partner with, leverage, and interoperate solutions from the industry's most trusted businesses. Yes, our work is complex and specialized. You can let us handle all the complexity. We simplify the way your company manages identity. -
38
Saviynt
Saviynt
Saviynt offers intelligent identity access management and governance to cloud, hybrid, and on-premise IT infrastructures in order to accelerate enterprise digital transformation. Our platform integrates seamlessly with the most popular IaaS, PaaS and SaaS applications, including AWS Azure, Oracle EBS and SAP HANA. Gartner awarded the Trust Award to our IGA 2.0 advanced risk analysis platform and named it an industry leader. -
39
RadiantOne
Radiant Logic
Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes. -
40
midPoint
Evolveum
Choose the best. Join hundreds of other organizations who have tried midPoint, the open source leader in Identity Governance and Administration. You can choose what works best for you: midPoint can be used on-premise, in the hybrid cloud, or in the cloud. Enhance your security and efficiency by synchronizing, policing, and identity management. MidPoint's outstanding accountability, record-keeping capabilities, and data protection scope will help you meet the regulations. Advanced privacy and data protection mechanisms allow users to take control of the personal data they have been given by organizations. Users can now access their data via self-service, reset passwords, and manage their profiles. This will enhance the digital experience. Enjoy the comfort and scalability that midPoint cloud offers. Third-party experts can be hired to manage the seamless operation. This will save you valuable time and human resource. Get the most from the synergy. -
41
EmpowerID
EmpowerID
$2 per user per monthEmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business. -
42
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
43
Ilantus Compact Identity
Ilantus Technologies
It is the first time that an IAM solution is available that is comprehensive, deep, and easy to implement even by non-IT personnel. This includes Access Management, Identity Governance and Administration. You can implement the solution step by step and at your own pace with an online digital guidance system. Ilantus offers free implementation support, unlike other vendors. Seamless SSO with "no app left behind", including on-premise or thick-client apps. All web apps, whether they are federated, non federated or thick-client, legacy, custom, or other apps, will be included in your SSO environment. Support is also available for mobile apps and IOT devices. What is your homegrown app? This will not be a problem thanks to our interactive digital help guide. If you need help, you can call Ilantus' dedicated helpline, available 24 hours a day, Monday through Friday, and we will assist you with the integration. -
44
Fastpath
Fastpath
Fastpath's cloud based access orchestration allows organizations to manage, automate, and streamline identity, access governance and data and configuration updates - efficiently and effectively. Our intuitive cloud platform integrates GRC and identity governance into a sophisticated, yet easy-to use solution. Automate, control and monitor access to applications, data records and individual data records, all without effort. Fastpath's platform has been designed by auditors, who understand the complexity involved in securing access to business applications. We created a solution to reduce the time, costs and complexity of audit processes and reporting in order to prove compliance. -
45
IBM Verify Governance enables organizations to provision, audit, and report on user activity and access through lifecycle, analytics, and compliance capabilities. You need to know who has access to which information and how it is used within your organization. Is your identity management working intelligently? IBM is focused primarily on collecting and analyzing data about identity to support enterprise IT compliance and regulatory compliance. IBM Verify Governance will help you gain better visibility into the way access is being used, prioritize compliance actions based on risk-based insights and make better decisions using clear actionable intelligence. All of this is based on a business activity-based approach to risk modelling, a major IBM differentiator that makes life easier and more efficient for risk compliance managers and auditors. Enable and streamline self-service and full provisioning requests to quickly onboard or offboard employees.
-
46
Access Auditor
Security Compliance Corp
Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week. -
47
Veza
Veza
Data is being reconstructed to be used in the cloud. Identity is now defined in a broader sense than just humans. It includes service accounts and principals. Authorization is the most true form of identity. In the multi-cloud world, a dynamic and novel approach is needed to secure enterprise data. Veza is the only solution that can provide a comprehensive view of authorization for your identity-to data relationships. Veza is an agentless, cloud-native platform that poses no risk to the data or availability of your data. We make it simple for you to manage your authorization across your entire ecosystem of cloud services so that you can empower users to securely share data. Veza supports critical systems such as unstructured data, structured data, data lakes, cloud-based IAM and apps from the start. You can also create your own custom applications by leveraging Veza’s Open Authorization API. -
48
WSO2 Identity Server
WSO2
WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience. -
49
Evidian
Eviden
Each of us expects the same level of convenience at work as at home in today's digital world. Evidian IDaaS allows your users to authenticate once and access all available web resources transparently. You can increase their satisfaction while also improving overall security level. Every suppressed (avoided), password is one less attack vector. Evidian IDaaS integrates on-premise and cloud applications to your Transparent SO. -
50
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management.