getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Access Governance Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


69 software options

Infisign logo

Cloud-based identity and access management (IAM) solution

learn more
Infisign stands at the forefront of Identity and Access Management (IAM) solutions, driven by a zero-trust philosophy that offers increased security and privacy control for all authentication requirements for organizations of all sizes.

Read more about Infisign

Users also considered
OpenText Identity Manager logo

Identity management and access governance solution

learn more
NetIQ Identity Manager is a comprehensive identity and access management solution offered by Micro Focus. It is designed to help organizations manage user identities and access permissions across the enterprise, ensuring that only authorized users have access to sensitive data and applications.

Read more about OpenText Identity Manager

Users also considered
SecurEnds Identity Governance and Access Control logo

Governance, risk, and compliance management software

learn more
SecurEnds Identity Governance and Access Control solution allows organizations to detect, monitor, and manage access to sensitive data by employees and third parties. The solution helps organizations meet the need to identify individuals across all systems, applications, and channels, and ensure compliance with regulatory guidelines.

Read more about SecurEnds Identity Governance and Access Control

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping’s web/API access solution enables organizations to:
● Phase off their WAM solution at their own pace without a rip-and-replace approach
● Secure access across large, multi-generational hybrid IT environments
● Protect access to the ever-growing number of APIs

Read more about Ping Identity

Users also considered
Zilla Security logo

Cloud security and threat detection platform

learn more
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered
B-Line logo

Transforming the way workplaces are managed

learn more
B-Line is a flexible workplace management and security platform that helps asset managers and employers manage their hybrid workplace with digital access, flex management, and ongoing capacity monitoring and space utilization analytics.

Read more about B-Line

Users also considered
Florbs logo

Accelerate your Google Workspace management

learn more
Florbs is an official Google Cloud Partner with a mission to streamline businesses' operations in Google Workspace. Our solutions include: Admin Automation for powerful user lifecycle workflows, Email Signature Management for brand consistency, and Security & Auditing to secure data in Google Drive.

Read more about Florbs

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
Auth0 logo

Secure access for everyone. But not just anyone.

learn more
Auth0 by Okta takes a modern approach to identity, enabling organizations to provide secure access to any application. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security, so customers can focus on innovation.

Read more about Auth0

Users also considered
Cisco Duo logo

Cloud-based identity security and access management

learn more
Cisco Duo is a cloud-based identity security solution that secures access to your critical resources for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem, whether multi-cloud, hybrid, or on-premises.

Read more about Cisco Duo

Users also considered
Access Rights Manager logo

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
tenfold logo

No-Code Identity Governance & Administration with faster ROI

learn more
No-Code Identity Governance & Administration with faster time to value. We ensure the right people have access to the right resources at the right time.

Read more about tenfold

Users also considered
NordPass Business logo

Business password manager for advanced cybersecurity.

learn more
Controlling your businesses' access is crucial for achieving regulatory compliance since standards like HIPAA and NIST require organizations to implement secure access management solutions.
NordPass enables you to do just that by centralizing your company's access controls in one single place.

Read more about NordPass Business

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

learn more
ADManager Plus provides comprehensive access governance. It manages permissions across Active Directory, Microsoft 365, and Google Workspace, performs identity risk assessment, drives access certification campaigns, and generates compliance reports for strict control.

Read more about ManageEngine ADManager Plus

Users also considered
miniOrange logo

One solution for billions of Identity & Access needs.

learn more
miniOrange is a identity and access management (IAM) provider for businesses to make any IAM feature applicable such as SSO, MFA, Provisioning, Brokering, etc. on any application across the internet.

Read more about miniOrange

Users also considered
ManageEngine Password Manager Pro logo

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Contentverse logo

Simple, secure document management for everyone

learn more
Contentverse is a secure, versatile, fully-featured enterprise content management solution. 128-bit encryption. DocuSign integration. On-premise and/or cloud implementation. With a robust indexing module that can detect text, barcodes, and QR codes on scanned pages as searchable metadata.

Read more about Contentverse

Users also considered
Portnox CLEAR logo

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Heimdal Application Control logo

Application Whitelisting and Blacklisting Made Simple.

learn more
Heimdal Application Control is a novel approach to application control that makes app whitelisting and blacklisting simple with rule-based frameworks and auto-approval flows. Designed to integrate seamlessly with a PAM solution, it is the ideal enhancement to your company's security.

Read more about Heimdal Application Control

Users also considered
The OptimalCloud logo

Cloud-based identity and access management software

learn more
The OptimalCloud helps organizations manage and provide secure access to various applications using single sign-on (SSO) capability. Users can submit registration requests, reset passwords, delegate administrative tasks to members across teams, and approve workflows via a unified portal.

Read more about The OptimalCloud

Users also considered
AccessHub logo

One Platform. Total Control. Seamless Access Governance.

learn more
AccessHub.AI reduces access risk, audit gaps, and compliance exposure by governing users, roles, and entitlements with clear ownership, automated approvals, lifecycle automation, and full traceability across SAP, S/4HANA, and hybrid enterprise environments.

Read more about AccessHub

Users also considered
Scalefusion OneIdP logo

Access governance and authentication solution

learn more
Enable secure and seamless Single Sign-On (SSO) with conditional access policies, device trust validation, and integration with external directories.

Read more about Scalefusion OneIdP

Users also considered
Efecte IGA logo

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte IGA

Users also considered