Best User Provisioning and Governance Software for OneLogin

Find and compare the best User Provisioning and Governance software for OneLogin in 2025

Use the comparison tool below to compare the top User Provisioning and Governance software for OneLogin on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Cisco Duo Reviews
    Top Pick

    Cisco Duo

    Cisco

    $3 per user per month
    1,290 Ratings
    See Software
    Learn More
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 2
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 3
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 4
    SafePaaS Reviews
    SafePaaS provides proven solutions to specific industry Governance Risk and Compliance issues. SafePaaS Industry Controls Solutions increase margins by mitigating operational losses in all major industries, including Consumer Goods, Education, Energy, Financial Services, Health Care, High Tech, Life Sciences, Manufacturing, Media & Entertainment, Public Sector, Retail and Transportation, Construction, Banking. SafePaaS optimizes every significant business process and provides embedded controls to ensure that organizations can shift to a proactive, predictive GRC management approach. This is in contrast to an informal or reactive approach. SafePaaS Process Controls Solutions can be used in all major business areas, including Financial Management, OrderManagement and Supply Chain Management. SafePaaS provides a complete governance, risk and compliance platform with integrated ERP application controls management for all major ERP systems.
  • 5
    Entitle Reviews
    Entitle blends a security-first approach in provisioning and governance with a commitment for business enablement for all employees, from R&D and Sales to H&R to finance. To speed up provisioning, security policies can be automatically updated to reflect changes in infrastructure and employee requirements. Permissions can be granted to specific resources such as Google Drive folders and database tables, Git repositories, or other resources. Protect privileged roles and resources by only granting access when necessary, and removing them when they are not. For authorizations you can trust, give access requests to peers, managers, resource owners, and managers. DevOps and IT can save significant time and resources by using automated access requests and zero touch provisioning. For a seamless approval process, users can request access via Slack or Teams, Jira or email. To keep up with organizational changes, grant bulk permissions to speed onboarding and offboarding.
  • Previous
  • You're on page 1
  • Next