App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Customer Identity and Access Management (CIAM) Software with User Management

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

34 software options

Sponsored

1 filter applied


Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

EmpowerID logo
(0)

Identity management & cloud security suite of tools with MFA

visit website
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Okta logo
4.7
(805)

On-demand identity & access management for enterprise

learn more
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance.

Read more about Okta

Users also considered
Duo Security logo
4.7
(511)

User identity verification & device vulnerability discovery

learn more
Duo Security provides a Trusted Access platform offering multiple two-factor authentication methods, mobile apps, and an Access Gateway for Single Sign-On (SSO)

Read more about Duo Security

Users also considered
OneLogin logo
4.6
(90)

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Mailock logo
4.7
(62)

Secure emails with encryption and recipient authentication

learn more
Exchange confidential information securely using your existing email setup. Encrypt messages and authenticate your recipients.

Read more about Mailock

Users also considered
Auth0 logo
4.6
(62)

Secure access for everyone. But not just anyone.

learn more
Customer Identity (CIAM) is how companies give end users access to their digital properties, as well as how they govern, collect, analyze, and securely store that data.
Basically, it’s how Okta and Auth0 can build you an awesome login box.

Read more about Auth0

Users also considered
Conecta Suite logo
4.8
(45)

Connect management to technology

learn more
Cloud-based email signatures platform that helps businesses of all sizes and industries that use Google Workspace. It includes several functions such as creating email signatures, editing absence messages, creating custom groups, and more. Avoid labor lawsuits and data breaches.

Read more about Conecta Suite

Users also considered
Admin By Request logo
4.8
(37)

Local admin rights, managed.

learn more
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.

Read more about Admin By Request

Users also considered
Azure Active Directory logo
4.8
(38)

Cloud-based identity and access management (IAM) software

learn more
Azure Active Directory, part of Microsoft Entra, is an identity and access management (IAM) software designed to help enterprises provide protection against cybersecurity attacks through single sign-on (SSO) and multi-factor authentication. It allows administrators to securely engage with internal and external stakeholders and provide on-site and remote access to various applications.

Read more about Azure Active Directory

Users also considered
Ping Identity logo
4.7
(37)

Experience a better experience with Ping Identity.

learn more
Ping's CIAM solution innovates how you engage your customers by delivering seamless and secure digital experiences. Don't let long registration forms, forgotten passwords, scattered user data, and disjointed experiences frustrate your customers.

Read more about Ping Identity

Users also considered
FusionAuth logo
4.8
(30)

Authentication, Authorization, & user management for any app

learn more
FusionAuth is the only authentication, authorization, and user management built for devs. It deploys on any application in minutes. Get every feature you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login and more. Comply with GDPR, HIPAA, COPPA, and PCI.

Read more about FusionAuth

Users also considered
miniOrange logo
4.4
(32)

One solution for billions of Identity & Access needs.

learn more
miniOrange is a identity and access management (IAM) provider for businesses to make any IAM feature applicable such as SSO, MFA, Provisioning, Brokering, etc. on any application across the internet.

Read more about miniOrange

Users also considered
WSO2 Identity Server logo
4.3
(32)

CIAM Beyond Access Management

learn more
WSO2 Identity Server provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce IAM requirements.

Read more about WSO2 Identity Server

Users also considered
Frontegg logo
4.8
(12)

User Management for the PLG Era

learn more
Frontegg is a user management platform, designed for the Product-Led Growth (PLG) era. Frontegg provides blazing-fast integration of a powerful user infrastructure, designed to handle modern application use-cases.

Read more about Frontegg

Users also considered
Entrust Identity as a Service logo
5.0
(4)

Identity & access management solution

learn more
Entrust IDaaS is a cloud-based IAM solution designed to help organizations of all sizes deploy multi-factor authentication for accessing networks, devices, and applications. Key features include single sign-on, IAM, virtual smart cards, workflow automation, user group and identity management.

Read more about Entrust Identity as a Service

Users also considered
Authsignal logo
5.0
(2)

Authsignal, build trusted user authentication journeys.

learn more
Authsignal is a fraud ops and authentication platform that enables the orchestration of customer journeys leveraging Passwordless Authentication flows. Drop in Authsignal to your existing Identity stack and leverage our no-code rules engine. Deploy passkeys, and secure customer journeys today!

Read more about Authsignal

Users also considered
AU10TIX logo
5.0
(2)

Identity and document verification management software

learn more
AU10TIX helps businesses in financial services, telecommunication, marketplaces, and other verticals streamline identity authentication operations. The platform lets users automate customer data verification processes, ensure compliance with statutory regulation, and avoid fraudulent activities.

Read more about AU10TIX

Users also considered
Oz Liveness logo
5.0
(2)

Facial recognition tool for mitigating biometric fraud

learn more
Oz Liveness is a facial recognition tool, which helps organizations mitigate the risk of biometric fraud by preventing deepfake and spoofing attacks using advanced algorithms

Read more about Oz Liveness

Users also considered
Kinde logo
5.0
(1)

Simple, powerful authentication that integrates in minutes.

learn more
Kinde is a cloud-based software infrastructure provider for modern applications. Its offering spans authentication, user management, release management, and billing, all in one place and easily implemented for any tech stack.

Read more about Kinde

Users also considered
AccessOwl logo
5.0
(1)

Cloud-based access management and governance software

learn more
AccessOwl is an identity governance and access management platform that automates user provisioning and de-provisioning. It provides a live view of user accounts and permissions across SaaS applications. AccessOwl enables access requests, approval workflows, and access reviews to strengthen compliance. The software integrates with HRIS systems for automated onboarding and offboarding.

Read more about AccessOwl

Users also considered
CoreOne Suite logo
5.0
(1)

IT management solution for medium to large businesses

learn more
CoreOne Suite is a cloud-based and on-premise IT management solution which helps medium to large businesses manage identity, access, operations, and single sign-on. The platform enables users to automate employee entries, withdrawals, transgressions and mutations with role-based authorizations.

Read more about CoreOne Suite

Users also considered
RapidIdentity logo
3.5
(2)

Identity and access management software for K-12 institutes

learn more
RapidIdentity is an identity management software that helps K-12 educational institutes manage provisioning, create user groups, configure roles, and more on a centralized platform. It enables administrators to set up single sign-on (SSO) and multi-factor authentication (MFA) to provide students with access to on-premise and cloud-based applications.

Read more about RapidIdentity

Users also considered
The Credivera Exchange logo
(0)

Cloud-based digital identity management solution

learn more
The Credivera Exchange is a cloud-based digital identity management solution that allows businesses in the IT industry to handle credential verification processes, perform audits, and manage projects from a unified platform.

Read more about The Credivera Exchange

Users also considered
Secomea logo
(0)

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
PropelAuth logo
(0)

Authentication software

learn more
PropelAuth is a B2B authorization software that helps businesses sell to companies of any size immediately with just a few lines of code.

Read more about PropelAuth

Users also considered