getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Customer Identity and Access Management (CIAM) Software - Page 3

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


69 software options

Veriam logo

Access & Subscriptions made easy

learn more
Veriam is a comprehensive customer identity and access management solution that simplifies the entire user identity process. It offers self-serve onboarding with multiple sign-up options, account setup, and gradual data collection. Veriam provides role assignments, secure access management, and integration with providers like Google and Microsoft, ensuring a secure login experience for customers.

Read more about Veriam

Users also considered
TrueKYC logo

Cloud-based KYC solution for small businesses.

learn more
TrueKYC helps you manage customer identities securely through flexible verification flows. Define required data, collect it with branded links, and approve or decline submissions quickly. Protect access and maintain compliance without heavy IT overhead.

Read more about TrueKYC

Users also considered
swIDch PLC-OTAC logo

Dynamic, Passwordless Security for Industrial Control

learn more
PLC-OTAC by swIDch is a single-step multi-factor authentication solution that utilizes dynamic one-time authentication codes to significantly increase security for programmable logic controllers (PLCs) with minimal disruption and computing requirements. This technology neutralizes common PLC vulnerabilities such as default passwords, password sharing, and credential theft, providing a highly secure and streamlined authentication process.

Read more about swIDch PLC-OTAC

Users also considered
Simplici logo

Identity verification and KYC software

learn more
Simplici is a compliance and verification solution that streamlines processes with secure eSignatures and KYC/AML checks. It offers customizable no-code customer onboarding flows and automated onboarding and funding through a mobile-first interface. Simplici also provides built-in legally binding e-signatures to improve security and trust.

Read more about Simplici

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Stytch logo

Identity platform providing APIs and SDKs

learn more
Stytch is an identity platform providing APIs and SDKs to integrate authentication and security into applications. The platform offers enterprise-grade authentication features including passkeys, breach-resistant passwords, and SAML SSO, alongside bot and fraud protection with intelligent rate limiting. Stytch supports both human users and AI agents with turnkey multi-tenancy capabilities and an embeddable admin portal for self-service configuration.

Read more about Stytch

Users also considered
Tesseral logo

Open source identity management for business software

learn more
Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code.

Read more about Tesseral

Users also considered
SecureAuth CIAM logo

Customer identity and access management software

learn more
SecureAuth CIAM enables businesses to deliver frictionless customer experiences while always protecting customer data and brand reputation. SecureAuth's comprehensive CIAM solutions allow organizations to scale without limits, build trust and brand loyalty, secure customer accounts with flexible authentication, and reduce total cost of ownership through intuitive user interfaces and administration.

Read more about SecureAuth CIAM

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Prove ID logo

All-Suite ID Verification & Management Platform

learn more
Prove ID is an all suite KYC platform for businesses to build trust online in a legally compliant way. It allows any two or more parties to verify ID, willingness and eligibility for accessing services.

Read more about Prove ID

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
ReachFive logo

SaaS CIAM: Secure identity, Access, and Omnichannel CX

learn more
ReachFive's CIAM manages external customer identities and access, focusing on UX, security, and GDPR compliance. It enables seamless, personalized omnichannel experiences via flexible registration, unified profiles, consent management, MFA, and API integration, building trust and customer value.

Read more about ReachFive

Users also considered
PropelAuth logo

Authentication software

learn more
PropelAuth is a B2B authorization software that helps businesses sell to companies of any size immediately with just a few lines of code.

Read more about PropelAuth

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered
Kycaid logo

KYC&AML compliance solution for businesses

learn more
Kycaid is a one-stop-shop compliance platform with a mission to help businesses to stay compliant with regulations through AML&KYC solutions and more. Kycaid employs a holistic approach to verifying your clients' identity, from the document and biometric check to AML screening and KYB verification.

Read more about Kycaid

Users also considered
OpenText Identity and Access Management logo

On-premise and cloud-based CIAM solution

learn more
OpenText Identity and Access Management is a cloud-based identity and access management (CIAM) solution that helps companies manage user identities, applications, and other data across the organization. It helps companies create secure user accounts, manage password complexity and expiration, protect sensitive information from unauthorized access and misuse, provide single sign-on capabilities for multiple systems with different authentication methods, and more.

Read more about OpenText Identity and Access Management

Users also considered
Haventec Authenticate logo

Multi-factor protection without multi-factor friction.

learn more
Haventec Authenticate is an authentication engine for developers and product teams. It gives you the ability to add passwordless MFA to your application or enhance the security of your existing username/password authentication with a Silent MFA option that is easy to deploy and manage.

Read more about Haventec Authenticate

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered