App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Customer Identity and Access Management (CIAM) Software - Page 2

59 software options

Sponsored

Filter results

Features


Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

LoginRadius logo

LoginRadius

3.8
(13)

Customer Identity and Access Management Platform

learn more
LoginRadius is a leading Customer Identity and Access Management (CIAM) platform to help businesses create a single view of their users. Organizations can leverage LoginRadius to securely manage customer identities via single sign-on (SSO), multi-factor authentication (MFA), and more.

Read more about LoginRadius

Users also considered
System Frontier logo

System Frontier

5.0
(3)

Customer identity and access management software

learn more
System Frontier is a customer identity and access management software designed to help businesses in the healthcare, transportation, utilities, finance, and other sectors manage user access across Windows servers and workstations. Administrators can control and gain visibility into actions, tasks, and changes executed in a sandbox environment.

Read more about System Frontier

Users also considered
SAP Customer Data Cloud logo

SAP Customer Data Cloud

4.1
(5)

Enhance customer experiences.

learn more
SAP Customer Data Cloudenhances customer experiences across marketing, commerce, sales, and service helping you understand your customers and deliver relevant, trusted, and personalized engagements.

Read more about SAP Customer Data Cloud

Users also considered
Authsignal logo

Authsignal

5.0
(2)

Authsignal, build trusted user authentication journeys.

learn more
Authsignal is a fraud ops and authentication platform that enables the orchestration of customer journeys leveraging Passwordless Authentication flows. Drop in Authsignal to your existing Identity stack and leverage our no-code rules engine. Deploy passkeys, and secure customer journeys today!

Read more about Authsignal

Users also considered
AU10TIX logo

AU10TIX

5.0
(2)

Identity and document verification management software

learn more
AU10TIX helps businesses in financial services, telecommunication, marketplaces, and other verticals streamline identity authentication operations. The platform lets users automate customer data verification processes, ensure compliance with statutory regulation, and avoid fraudulent activities.

Read more about AU10TIX

Users also considered
ValidEntry logo

ValidEntry

5.0
(2)

Free Web3.0 Identity Verification

learn more
ValidEntry enables businesses creating in Web3.0 to transform their customer identification process with AI-driven automated identity solutions.

Read more about ValidEntry

Users also considered
Oz Liveness logo

Oz Liveness

5.0
(2)

Facial recognition tool for mitigating biometric fraud

learn more
Oz Liveness is a facial recognition tool, which helps organizations mitigate the risk of biometric fraud by preventing deepfake and spoofing attacks using advanced algorithms

Read more about Oz Liveness

Users also considered
NorthRow  logo

NorthRow

4.5
(2)

Compliance management solution

learn more
NorthRow provides software which empowers compliance officers to make faster decisions and onboard customers in seconds, not days whilst complying with ever-changing legislation, so that they can contribute to their business’ growth, safely.

Read more about NorthRow

Users also considered
Kinde logo

Kinde

5.0
(1)

Simple, powerful authentication that integrates in minutes.

learn more
Kinde is a cloud-based software infrastructure provider for modern applications. Its offering spans authentication, user management, release management, and billing, all in one place and easily implemented for any tech stack.

Read more about Kinde

Users also considered
Gataca logo

Gataca

5.0
(1)

Issue, verify, and manage identity credentials.

learn more

Gataca Studio streamlines identity credentials issuance, verification, and management from one simple dashboard. Gataca Wallet securely stores tamper-proof identity credentials, allowing passwordless and privacy-preserving access to online services.

Read more about Gataca

Users also considered
CoreOne Suite logo

CoreOne Suite

5.0
(1)

IT management solution for medium to large businesses

learn more
CoreOne Suite is a cloud-based and on-premise IT management solution which helps medium to large businesses manage identity, access, operations, and single sign-on. The platform enables users to automate employee entries, withdrawals, transgressions and mutations with role-based authorizations.

Read more about CoreOne Suite

Users also considered
PowerAuth logo

PowerAuth

5.0
(1)

Modern Authentication for Financial Apps. Deployed in a Snap

learn more
Provide your customers with the fastest and most secure access and transaction signing with passwordless strong customer authentication (SCA). Deploy in a snap and turn your app into a secure doorway to digital finance. PowerAuth can be a standalone mobile token app or a plugin for mobile banking.

Read more about PowerAuth

Users also considered
Teleport logo

Teleport

5.0
(1)

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
RapidIdentity logo

RapidIdentity

3.5
(2)

Identity and access management software for K-12 institutes

learn more
RapidIdentity is an identity management software that helps K-12 educational institutes manage provisioning, create user groups, configure roles, and more on a centralized platform. It enables administrators to set up single sign-on (SSO) and multi-factor authentication (MFA) to provide students with access to on-premise and cloud-based applications.

Read more about RapidIdentity

Users also considered
remote.it logo

remote.it

(0)

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
SSI Kit logo

SSI Kit

(0)

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about SSI Kit

Users also considered
OpenText Identity and Access Management logo

OpenText Identity and Access Management

(0)

On-premise and cloud-based CIAM solution

learn more
OpenText Identity and Access Management is a cloud-based identity and access management (CIAM) solution that helps companies manage user identities, applications, and other data across the organization. It helps companies create secure user accounts, manage password complexity and expiration, protect sensitive information from unauthorized access and misuse, provide single sign-on capabilities for multiple systems with different authentication methods, and more.

Read more about OpenText Identity and Access Management

Users also considered
The Credivera Exchange logo

The Credivera Exchange

(0)

Cloud-based digital identity management solution

learn more
The Credivera Exchange is a cloud-based digital identity management solution that allows businesses in the IT industry to handle credential verification processes, perform audits, and manage projects from a unified platform.

Read more about The Credivera Exchange

Users also considered
strongDM logo

strongDM

(0)

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Omada Identity logo

Omada Identity

(0)

Do more with identity

learn more
Omada offers a full-featured Identity Governance & Administration (IGA) as a service solution that enables organizations to achieve compliance, reduce risk, and maximize efficiency. Omada delivers innovative identity management, helps customers deploy within 12 weeks, and scale with confidence.

Read more about Omada Identity

Users also considered
Kycaid logo

Kycaid

(0)

KYC&AML compliance solution for businesses

learn more
Kycaid is a one-stop-shop compliance platform with a mission to help businesses to stay compliant with regulations through AML&KYC solutions and more. Kycaid employs a holistic approach to verifying your clients' identity, from the document and biometric check to AML screening and KYB verification.

Read more about Kycaid

Users also considered
Incode Omni logo

Incode Omni

(0)

Automated. Modular. Customizable, no-code orchestration.

learn more
Global organizations choose Incode for IDV, AML, KYC, KYB, and Age Verification. Incode's suite of end-to-end, AI-powered identity solutions revolutionizes onboarding and intelligence with modular, no-code orchestration and source-of-truth connections. Drive conversions and revenue at Incode.com

Read more about Incode Omni

Users also considered
PropelAuth logo

PropelAuth

(0)

Authentication software

learn more
PropelAuth is a B2B authorization software that helps businesses sell to companies of any size immediately with just a few lines of code.

Read more about PropelAuth

Users also considered
Maverics Identity Orchestration logo

Maverics Identity Orchestration

(0)

Customer identity and access management (CIAM) solution

learn more
Strata is a new category of identity software called Identity Orchestration. It helps IT security teams secure every application on any cloud or IDP. Identity Orchestration simplifies identity management across complex environments, including on-prem and cloud, by consistently applying modern authentication and authorization policies across any application or platform.

Read more about Maverics Identity Orchestration

Users also considered
Haventec Authenticate logo

Haventec Authenticate

(0)

Multi-factor protection without multi-factor friction.

learn more
Haventec Authenticate is an authentication engine for developers and product teams. It gives you the ability to add passwordless MFA to your application or enhance the security of your existing username/password authentication with a Silent MFA option that is easy to deploy and manage.

Read more about Haventec Authenticate

Users also considered