App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Customer Identity and Access Management (CIAM) Software with Secure Login

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

33 software options

Sponsored

1 filter applied


Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

EmpowerID logo
(0)

Identity management & cloud security suite of tools with MFA

visit website
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Duo Security logo
4.7
(511)

User identity verification & device vulnerability discovery

learn more
Duo Security provides a Trusted Access platform offering multiple two-factor authentication methods, mobile apps, and an Access Gateway for Single Sign-On (SSO)

Read more about Duo Security

Users also considered
OneLogin logo
4.6
(90)

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Mailock logo
4.7
(62)

Secure emails with encryption and recipient authentication

learn more
Exchange confidential information securely using your existing email setup. Encrypt messages and authenticate your recipients.

Read more about Mailock

Users also considered
Auth0 logo
4.6
(62)

Secure access for everyone. But not just anyone.

learn more
Customer Identity (CIAM) is how companies give end users access to their digital properties, as well as how they govern, collect, analyze, and securely store that data.
Basically, it’s how Okta and Auth0 can build you an awesome login box.

Read more about Auth0

Users also considered
Conecta Suite logo
4.8
(45)

Connect management to technology

learn more
Cloud-based email signatures platform that helps businesses of all sizes and industries that use Google Workspace. It includes several functions such as creating email signatures, editing absence messages, creating custom groups, and more. Avoid labor lawsuits and data breaches.

Read more about Conecta Suite

Users also considered
Admin By Request logo
4.8
(37)

Local admin rights, managed.

learn more
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.

Read more about Admin By Request

Users also considered
ManageEngine ADManager Plus logo
4.5
(52)

Active Directory Management and Reporting Solution

learn more
ManageEngine ADManager Plus is a wholesome yet simple-to-use, web-based Active Directory management solution that makes day-to-day AD management immensely easy. The intuitive user interface of the product gets rid of the monotony in using native AD tools.

Read more about ManageEngine ADManager Plus

Users also considered
FusionAuth logo
4.8
(30)

Authentication, Authorization, & user management for any app

learn more
FusionAuth is the only authentication, authorization, and user management built for devs. It deploys on any application in minutes. Get every feature you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login and more. Comply with GDPR, HIPAA, COPPA, and PCI.

Read more about FusionAuth

Users also considered
miniOrange logo
4.4
(32)

One solution for billions of Identity & Access needs.

learn more
miniOrange is a identity and access management (IAM) provider for businesses to make any IAM feature applicable such as SSO, MFA, Provisioning, Brokering, etc. on any application across the internet.

Read more about miniOrange

Users also considered
WSO2 Identity Server logo
4.3
(32)

CIAM Beyond Access Management

learn more
WSO2 Identity Server provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce IAM requirements.

Read more about WSO2 Identity Server

Users also considered
Frontegg logo
4.8
(12)

User Management for the PLG Era

learn more
Frontegg is a user management platform, designed for the Product-Led Growth (PLG) era. Frontegg provides blazing-fast integration of a powerful user infrastructure, designed to handle modern application use-cases.

Read more about Frontegg

Users also considered
Authfy logo
4.9
(7)

CIAM; IAM; Passwordless; MFA; Identity; Authentication

learn more
Authfy securely enables digital business, provides the best experience for consumers: frictionless and passwordless; protects customer data, prevents attacks and unifies the entire authentication, authorization, risk assessment and fraud prevention journey, with zero trust and security by design.

Read more about Authfy

Users also considered
Truora logo
4.8
(6)

Background Check/Authentication Solution

learn more
Truora provides advanced technology solutions for businesses to ensure security and integrity in their operations. Main products include background checks, identity vlidation, electronic signatures and WhatsApp engagement platfomrs.

Read more about Truora

Users also considered
Entrust Identity as a Service logo
5.0
(4)

Identity & access management solution

learn more
Entrust IDaaS is a cloud-based IAM solution designed to help organizations of all sizes deploy multi-factor authentication for accessing networks, devices, and applications. Key features include single sign-on, IAM, virtual smart cards, workflow automation, user group and identity management.

Read more about Entrust Identity as a Service

Users also considered
LoginRadius logo
3.8
(13)

Customer Identity and Access Management Platform

learn more
LoginRadius is a leading Customer Identity and Access Management (CIAM) platform to help businesses create a single view of their users. Organizations can leverage LoginRadius to securely manage customer identities via single sign-on (SSO), multi-factor authentication (MFA), and more.

Read more about LoginRadius

Users also considered
Incode Omni logo
5.0
(4)

Automated. Modular. Customizable, no-code orchestration.

learn more
Global organizations choose Incode for IDV, AML, KYC, KYB, and Age Verification. Incode's suite of end-to-end, AI-powered identity solutions revolutionizes onboarding and intelligence with modular, no-code orchestration and source-of-truth connections. Drive conversions and revenue at Incode.com

Read more about Incode Omni

Users also considered
Authsignal logo
5.0
(2)

Authsignal, build trusted user authentication journeys.

learn more
Authsignal is a fraud ops and authentication platform that enables the orchestration of customer journeys leveraging Passwordless Authentication flows. Drop in Authsignal to your existing Identity stack and leverage our no-code rules engine. Deploy passkeys, and secure customer journeys today!

Read more about Authsignal

Users also considered
AU10TIX logo
5.0
(2)

Identity and document verification management software

learn more
AU10TIX helps businesses in financial services, telecommunication, marketplaces, and other verticals streamline identity authentication operations. The platform lets users automate customer data verification processes, ensure compliance with statutory regulation, and avoid fraudulent activities.

Read more about AU10TIX

Users also considered
Oz Liveness logo
5.0
(2)

Facial recognition tool for mitigating biometric fraud

learn more
Oz Liveness is a facial recognition tool, which helps organizations mitigate the risk of biometric fraud by preventing deepfake and spoofing attacks using advanced algorithms

Read more about Oz Liveness

Users also considered
CoSync Auth logo
5.0
(2)

Customer identity and access management software

learn more
CoSync Auth is an authentication solution that helps developers create applications using MongoDB Realm to streamline user management. Key features include multi-factor authentication, user identity, custom metadata, custom email templates, custom authentication flows, language localization, and more.

Read more about CoSync Auth

Users also considered
Kinde logo
5.0
(1)

Simple, powerful authentication that integrates in minutes.

learn more
Kinde is a cloud-based software infrastructure provider for modern applications. Its offering spans authentication, user management, release management, and billing, all in one place and easily implemented for any tech stack.

Read more about Kinde

Users also considered
PowerAuth logo
5.0
(1)

Modern Authentication for Financial Apps. Deployed in a Snap

learn more
Provide your customers with the fastest and most secure access and transaction signing with passwordless strong customer authentication (SCA). Deploy in a snap and turn your app into a secure doorway to digital finance. PowerAuth can be a standalone mobile token app or a plugin for mobile banking.

Read more about PowerAuth

Users also considered
RapidIdentity logo
3.5
(2)

Identity and access management software for K-12 institutes

learn more
RapidIdentity is an identity management software that helps K-12 educational institutes manage provisioning, create user groups, configure roles, and more on a centralized platform. It enables administrators to set up single sign-on (SSO) and multi-factor authentication (MFA) to provide students with access to on-premise and cloud-based applications.

Read more about RapidIdentity

Users also considered
remote.it logo
(0)

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered