getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Customer Identity and Access Management (CIAM) Software - Page 3

Last updated: February 2026

69 software options

EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Prove ID logo

All-Suite ID Verification & Management Platform

learn more
Prove ID is an all suite KYC platform for businesses to build trust online in a legally compliant way. It allows any two or more parties to verify ID, willingness and eligibility for accessing services.

Read more about Prove ID

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered
Kycaid logo

KYC&AML compliance solution for businesses

learn more
Kycaid is a one-stop-shop compliance platform with a mission to help businesses to stay compliant with regulations through AML&KYC solutions and more. Kycaid employs a holistic approach to verifying your clients' identity, from the document and biometric check to AML screening and KYB verification.

Read more about Kycaid

Users also considered
PropelAuth logo

Authentication software

learn more
PropelAuth is a B2B authorization software that helps businesses sell to companies of any size immediately with just a few lines of code.

Read more about PropelAuth

Users also considered
Clavister IdAuth Cloud logo

Secure, cloud-based identity and authentication platform

learn more
Clavister IdAuth Cloud is a secure, cloud-based identity and authentication platform that delivers strong authentication, centralized identity management, and Zero Trust access control for modern IT and OT environments.

Read more about Clavister IdAuth Cloud

Users also considered
Veriam logo

Access & Subscriptions made easy

learn more
Veriam is a comprehensive customer identity and access management solution that simplifies the entire user identity process. It offers self-serve onboarding with multiple sign-up options, account setup, and gradual data collection. Veriam provides role assignments, secure access management, and integration with providers like Google and Microsoft, ensuring a secure login experience for customers.

Read more about Veriam

Users also considered
TrueKYC logo

Cloud-based KYC solution for small businesses.

learn more
TrueKYC helps you manage customer identities securely through flexible verification flows. Define required data, collect it with branded links, and approve or decline submissions quickly. Protect access and maintain compliance without heavy IT overhead.

Read more about TrueKYC

Users also considered
swIDch PLC-OTAC logo

Dynamic, Passwordless Security for Industrial Control

learn more
PLC-OTAC by swIDch is a single-step multi-factor authentication solution that utilizes dynamic one-time authentication codes to significantly increase security for programmable logic controllers (PLCs) with minimal disruption and computing requirements. This technology neutralizes common PLC vulnerabilities such as default passwords, password sharing, and credential theft, providing a highly secure and streamlined authentication process.

Read more about swIDch PLC-OTAC

Users also considered
OpenText Identity and Access Management logo

On-premise and cloud-based CIAM solution

learn more
OpenText Identity and Access Management is a cloud-based identity and access management (CIAM) solution that helps companies manage user identities, applications, and other data across the organization. It helps companies create secure user accounts, manage password complexity and expiration, protect sensitive information from unauthorized access and misuse, provide single sign-on capabilities for multiple systems with different authentication methods, and more.

Read more about OpenText Identity and Access Management

Users also considered
Simplici logo

Identity verification and KYC software

learn more
Simplici is a compliance and verification solution that streamlines processes with secure eSignatures and KYC/AML checks. It offers customizable no-code customer onboarding flows and automated onboarding and funding through a mobile-first interface. Simplici also provides built-in legally binding e-signatures to improve security and trust.

Read more about Simplici

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Simplici logo

Identity verification and KYC software

learn more
Simplici is a compliance and verification solution that streamlines processes with secure eSignatures and KYC/AML checks. It offers customizable no-code customer onboarding flows and automated onboarding and funding through a mobile-first interface. Simplici also provides built-in legally binding e-signatures to improve security and trust.

Read more about Simplici

Users also considered
Stytch logo

Identity platform providing APIs and SDKs

learn more
Stytch is an identity platform providing APIs and SDKs to integrate authentication and security into applications. The platform offers enterprise-grade authentication features including passkeys, breach-resistant passwords, and SAML SSO, alongside bot and fraud protection with intelligent rate limiting. Stytch supports both human users and AI agents with turnkey multi-tenancy capabilities and an embeddable admin portal for self-service configuration.

Read more about Stytch

Users also considered
Tesseral logo

Open source identity management for business software

learn more
Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code.

Read more about Tesseral

Users also considered
SecureAuth CIAM logo

Customer identity and access management software

learn more
SecureAuth CIAM enables businesses to deliver frictionless customer experiences while always protecting customer data and brand reputation. SecureAuth's comprehensive CIAM solutions allow organizations to scale without limits, build trust and brand loyalty, secure customer accounts with flexible authentication, and reduce total cost of ownership through intuitive user interfaces and administration.

Read more about SecureAuth CIAM

Users also considered
Clavister IdAuth Cloud logo

Secure, cloud-based identity and authentication platform

learn more
Clavister IdAuth Cloud is a secure, cloud-based identity and authentication platform that delivers strong authentication, centralized identity management, and Zero Trust access control for modern IT and OT environments.

Read more about Clavister IdAuth Cloud

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered