Best User Provisioning and Governance Software for Zoom

Find and compare the best User Provisioning and Governance software for Zoom in 2026

Use the comparison tool below to compare the top User Provisioning and Governance software for Zoom on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    1,037 Ratings
    See Software
    Learn More
    Auth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.
  • 2
    Josys Reviews

    Josys

    Josys

    $100/month
    245 Ratings
    See Software
    Learn More
    Josys is an innovative platform for Automated Identity Governance and Administration (IGA) that transforms the landscape of efficient and secure user provisioning. It features automated onboarding processes that provide appropriate access from the very first day and offboarding procedures that instantly remove all permissions when an employee leaves. Josys guarantees that access is meticulously managed without oversight gaps. With ongoing access evaluations, role-specific provisioning, and live audit logs, Josys empowers IT departments to ensure that each user possesses precisely the access they require, with no excess.
  • 3
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 4
    BetterCloud Reviews
    BetterCloud is the market leader for SaaS Operations, enabling IT professionals to transform their employee experience, maximize operational efficiency, and centralize data protection. With no-code automation enabling zero touch workflows, thousands of forward-thinking organizations like HelloFresh, Oscar Health and Square now rely on BetterCloud to automate processes and policies across their cloud application portfolio. With 10+ years experience pioneering the SaaS Operations movement, BetterCloud now serves the world’s largest community of SaaSOps experts. As host of Altitude, the industry’s leading SaaSOps event and publisher of The State of SaaSOps Report, the category’s definitive market research, BetterCloud is recognized by customers (G2) and leading analyst firms (Gartner and Forrester) as the market leader in SaaS Operations Management. Headquartered in New York City, with a product and engineering office in Atlanta, GA, as well as innovation hubs & remote talent across the U.S. BetterCloud is backed, among others, by some of the best technology investors including Vista Equity Partners, Warburg Pincus, Bain Capital, and Accel.
  • 5
    OneLogin Reviews
    Protect essential organizational data and enhance employee efficiency with OneLogin, a reliable identity and access management (IAM) platform tailored for contemporary businesses. This solution is crafted to bolster security within enterprises while streamlining login processes, making it an ideal choice for organizations aiming to implement security measures effortlessly. OneLogin boasts a variety of highly-rated functionalities, including single sign-on (SSO), a centralized directory, user provisioning, adaptive authentication, mobile identity management, compliance reporting, and additional features. By leveraging these tools, companies can ensure both security and ease of access for their users. As organizations continue to navigate the complexities of digital security, OneLogin stands out as a comprehensive solution to meet these evolving needs.
  • 6
    AppManager Reviews

    AppManager

    AppManager

    $4.99 per user per month
    Stop the tedious process of individually adding or removing users across various applications; with AppManager, you can manage everything simultaneously, drastically reducing both time and effort. In our fast-paced digital landscape, organizations depend on a multitude of applications to optimize workflows, boost efficiency, and encourage teamwork. However, this growing reliance on diverse applications presents the challenge of effective management. Gain better control over your budget with transparent insights into each employee's subscription expenses. Make informed, data-driven choices that could lead to significant savings for your business. Avoid the headaches associated with app management and user provisioning by adopting AppManager today. Discover the simplicity and convenience of overseeing your entire app and user environment through a single platform, and transform the way you manage your digital tools.
  • 7
    Indent Reviews

    Indent

    Indent

    $8 per month
    Effective security is essential, but it shouldn't be a cumbersome process; quicker access can lead to increased revenue. Provide an on-demand access system that is both swift and user-friendly, thereby avoiding frustrations for your team. Users can request access to applications, while managers can easily approve or reject these requests directly through Slack, all while maintaining a comprehensive audit trail. Eliminate the tedious process of manually coordinating approvals. Every access granted poses a potential security threat. Indent enables teams to enhance security measures and maintain least privilege by transitioning users to temporary access, ensuring efficiency is not compromised. Streamline the manual workflows required for SOC 2, SOX, ISO, and HITRUST compliance by integrating controls and policies directly into the access request processes. Grant access only when necessary, rather than issuing permanent access, which helps minimize your license overhead. Indent allows for significant cost savings while ensuring a frictionless experience for end users. In the pursuit of success in a rapidly expanding company, it is crucial for your team to embrace bold risks that can yield substantial rewards. This approach not only safeguards your operations but also empowers your workforce to act decisively and effectively.
  • 8
    Zoho Directory Reviews

    Zoho Directory

    Zoho

    $1.70/user/month
    Zoho Directory, a cloud-based platform for identity and access management, is designed to streamline authentication and authorization. It also simplifies user management. Single Sign-On (SSO), which allows employees to access multiple apps with a single set credentials, enhances security and user convenience. Multi-Factor Authentication is supported by the platform, adding an additional layer of protection from unauthorized access. Device authentication provides secure access to applications and devices. Employees can use the same credentials on all platforms. Zoho Directory offers robust provisioning capabilities, which allow IT administrators to create user profiles for various applications from the platform. This reduces the time spent on repetitive work. Directory stores facilitate integration with existing directories such as Microsoft Active Directory or Azure AD.
  • 9
    NIM Reviews

    NIM

    Tools4ever

    $1.55/month/user
    NIM simplifies the provisioning of users and lifecycle management. It offers both power and simplicity. It manages large numbers of users and systems for educational and commercial institutions. NIM aggregates information from multiple sources to streamline provisioning, rostering and exports. The Role Mining Tool simplifies role modeling while real-time impacts analysis helps in audits. Its customizable apps, automated processes and improved accuracy and efficiency are all a result of its customizable apps and automated process. NIM's flexible interface simplifies complex tasks and ensures organizations achieve high productivity.
  • 10
    CoreSuite Reviews
    All the best Microsoft 365 (formerly Office 365) management tools in one platform. CoreSuite gives you everything you need to automate, delegate, secure, and improve your company's productivity using Microsoft 365 (M365). M365 admin tasks can be distributed across multiple geographies and thousands of employees in enterprises. CoreSuite's single platform design makes it easy for admin tasks to be delegated, alerts to be automated and adoption facilitated. CoreSuite provides a single dashboard that allows users to seamlessly switch between tasks such as calculating chargebacks, preempting data breaches, onboarding new employees, and tracking long-term product adoption.
  • 11
    onetool Reviews

    onetool

    onetool

    $5 per employee per month
    Effortlessly oversee every facet of your organization's SaaS subscriptions through an intuitive platform. You can seamlessly add employees to the necessary applications and streamline their onboarding experience with just a click. Gain comprehensive insights into all your applications while monitoring both usage and expenses. By eliminating shadow IT and redundant licenses, you can achieve an average savings of 20%. Furthermore, when an employee departs, their access to all applications is automatically revoked, ensuring security. onetool simplifies the management of employee access to all your SaaS tools, regardless of your subscription plan. Save valuable time and enhance security by centralizing all onboarding and offboarding processes in one location. With only a few clicks on a single dashboard, you can control your employees' app access. Additionally, you can manage and track tool utilization by department and establish access protocols. onetool grants you a holistic view of your organization's SaaS utilization by identifying and monitoring active licenses, application usage, and expenditures. It also allows you to track all SaaS users and their app interactions, making it easier to spot any instances of shadow IT or unnecessary licenses that can be eliminated for better efficiency and cost management. This comprehensive approach ensures that your organization remains organized and secure while optimizing its software investments.
  • 12
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 13
    Zilla Security Reviews
    Zilla empowers security teams with the necessary visibility and automation to maintain the security and compliance of cloud applications effectively. By utilizing Zilla, you can confidently verify that your application security configurations are accurate, permissions are suitable, and that API-based integrations are safeguarded against potential data leaks. As the cloud footprint continues to grow, the complexity of data interactions also increases. Therefore, implementing automated access reviews becomes essential to ensure that both users and API integrations are granted appropriate access. The reliance on cumbersome spreadsheets or intricate identity governance solutions requiring costly professional service engagements is becoming outdated. With automated collectors, it’s effortless to gather permission data from all your cloud services and on-premises systems as needed, streamlining the compliance process. This approach not only enhances security but also saves valuable time and resources for security teams.
  • 14
    Youzer Reviews
    This unique user repository provides information about the arrivals and departures for employees, temporary workers, service providers, and others. In real-time. You can launch account suspension/creation actions with packages you have created. Youzer connects with all your applications to monitor and analyse all access accounts. Regularly verify the alignment of each employee’s authorisations. Everyone has the right to access what they need. Regular analysis of accounts that are missing authorizations, inconsistent authorisations, access rights, sensitive security groups, and other issues is necessary. A sales person, a technician, a consultant... The profile of the user that arrives will determine which account needs to be created. You can create the right accounts for the right people with the resource packages.
  • 15
    Cerby Reviews

    Cerby

    Cerby

    $20,000 per year
    Cerby streamlines the safeguarding of your brand by addressing frequent application misconfigurations that breach security protocols, such as the use of shared passwords and the deactivation of two-factor authentication, proactively preventing attackers from taking advantage of these vulnerabilities. Utilizing a blend of robotic process automation and application programming interfaces, Cerby establishes programmatic control points even when the application does not inherently provide them. By employing a variety of automation agents, including a browser plugin, a local desktop client, and a server-side isolated browser, Cerby is capable of executing pre-defined automation sequences. This flexibility allows the Cerby platform to effectively manage and automate crucial security maintenance tasks across any application, regardless of the limitations posed by the platform's APIs. Furthermore, Cerby enables administrators to review newly registered applications, providing insights into user interactions, data usage, and application engagement, followed by seamlessly securing these applications automatically to enhance overall security posture.
  • 16
    Entitle Reviews
    Entitle integrates a security-centric strategy for provisioning and governance while also prioritizing business facilitation across all departments, including R&D, sales, HR, and finance. Accelerate the provisioning process to enable security policies that adapt automatically to the evolving infrastructure and the varying needs of employees. Assign permissions to designated resources such as Google Drive directories, database tables, Git repositories, and more to maintain control. Protect sensitive resources and roles by allowing access only when necessary and revoking it when it is no longer needed. Empower colleagues, managers, and resource owners to authorize access requests, ensuring that the permissions granted are reliable. With automated access requests and a zero-touch provisioning approach, DevOps, IT, and other teams can significantly enhance efficiency and resource management. Users have the convenience of requesting access through platforms like Slack, Teams, Jira, or email, facilitating a smooth approval experience. Additionally, quickly grant bulk permissions to streamline the onboarding and offboarding processes, effectively adapting to the dynamics of the organization. This comprehensive approach not only safeguards data but also fosters a collaborative environment where teams can thrive.
  • 17
    ZeroTek Reviews
    ZeroTek is a specialized multi-tenant Identity and Access Management (IAM) Software as a Service (SaaS) platform designed specifically for managed service providers, enabling them to efficiently deploy, manage, and scale Okta identity solutions for various clients from a unified interface. By enhancing Okta's robust identity and access management features with tools tailored for managed service providers, it streamlines operations across multiple clients, allowing providers to offer secure authentication, single sign-on, and lifecycle management as a subscription service. A centralized dashboard provides teams with the ability to oversee and manage numerous customer directories, users, and applications in one location, effectively decreasing operational challenges and enhancing oversight. Additionally, ZeroTek facilitates the swift creation of Okta tenants in mere seconds, expediting the onboarding process for customers without the hassle of prolonged procurement or licensing hurdles. The platform also incorporates MSP-centric role-based access control to uphold least-privilege permissions for technicians, while thorough auditing capabilities ensure comprehensive accountability across all managed environments. Overall, ZeroTek empowers managed service providers to deliver seamless identity management solutions with greater efficiency and effectiveness.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB