getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Identity Management Software - Page 7

Last updated: April 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


176 software options

M365 Manager Plus logo

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Consolidate and manage access to machine and human identities throughout your organization. Provide granular access to data and applications for all the identities and manage privileged identity access centrally. Get an overview of all the identities in your network with the holistic dashboard view.

Read more about Securden Unified PAM

Users also considered
Cloud Identity logo

Multi biometric platform in the cloud (SaaS)

learn more
Multi biometric platform in the cloud, to reliably validate the identity of people, by capturing biographical and biometric data.

Read more about Cloud Identity

Users also considered
EnQualify logo

AI-based secure digital ID verification product

learn more
EnQualify is a digital ID verification solution which helps businesses manage identity verification by integrating variety of features. With an automated KYC/KYB platform, it offers businesses and individuals a secure way to verify identities anytime and anywhere.

Read more about EnQualify

Users also considered
IBM Security zSecure logo

A suite of tools for security assurance and task automation

learn more
IBM Security zSecure is a suite of user authorization and compliance automation products designed to add new levels of security to a mainframe. It supports IBM Z hardware, software, virtualization, and standard enterprise security managers (ESMs). With audits, alerts, reporting, and authentication tools, this solution can enhance security while detecting internal and external threats.

Read more about IBM Security zSecure

Users also considered
Daito logo

Web-based authenticator for TOTP

learn more
Easily manage 2FA for shared accounts with a web-based TOTP authenticator.

Read more about Daito

Users also considered
YeshID Onboard logo

Cloud-based identity management tool for growing companies.

learn more
YeshID Onboard is an identity management tool designed for organizations using Google Workspace. It enables users to streamline onboarding and offboarding processes with templates, task lists, and application provisioning.

Read more about YeshID Onboard

Users also considered
IDHub logo

Right Access, for Right People, to Right Systems

learn more
IDHub - fully customizable, on-prem or cloud IAM solution, no-code, GUI, drag-drop functionality, for IT & managers, to control user access & rights.

Easy to learn, simple to use.
Fail fast, succeed faster.
Implement changes/updates in hours, not months.
Straightforward, per-user pricing structure.

Read more about IDHub

Users also considered
IGA Toolkit logo

Identity governance and administration solution

learn more
IGA Toolkit is a web-based identity management software designed to help businesses streamline security administration and user identity processes across the organization. The solution facilitates automated testing of several security controls, such as access pattern analysis and user termination.

Read more about IGA Toolkit

Users also considered
Kycaid logo

KYC&AML compliance solution for businesses

learn more
Kycaid is a one-stop-shop compliance platform with a mission to help businesses to stay compliant with regulations through AML&KYC solutions and more. Kycaid employs a holistic approach to verifying your clients' identity, from the document and biometric check to AML screening and KYB verification.

Read more about Kycaid

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
Tecalis Authentication logo

Cloud-based multi-factor authentication solution

learn more
Tecalis Authentication is a cloud-based multi-factor authentication tool that helps businesses with credential management, biometric verification, and compliance regulation.

Read more about Tecalis Authentication

Users also considered
Efecte IGA logo

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte IGA

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Manage privileged access to identities and protect them from compromise. Consolidate identities and manage granular access provisions.

Read more about Securden

Users also considered
Melapress Login Security logo

Manage WordPress security with login and password policies

learn more
Melapress Login Security is a comprehensive WordPress plugin that enables website administrators to easily implement robust login and password security policies. This plugin empowers users to comply with these policies by providing real-time feedback and increasing overall website security. Key features include enforcing strong passwords, limiting failed login attempts, changing the WordPress login URL, and device recognition alerts.

Read more about Melapress Login Security

Users also considered
VeriFinger SDK logo

VeriFinger SDK is a solution for fingerprint identification

learn more
The VeriFinger algorithm is based on deep neural networks and follows the commonly accepted fingerprint identification scheme. It uses a set of specific fingerprint points (minutiae) along with a number of proprietary algorithmic solutions that enhance system performance and reliability.

Read more about VeriFinger SDK

Users also considered
Akku (Cloud Access Security Broker) logo

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
PasskeyBridge logo

Identity threat detection and response platform

learn more
PasskeyBridge is an identity threat response platform that ingests carrier signals, credentials, and biometric data to detect and neutralize security threats in real time. It executes automated playbooks to respond to incidents like SIM swaps, credential breaches, and unauthorized access. PasskeyBridge features FIDO2 passkey authentication, verifiable credentials with post-quantum cryptography, and insider threat analytics without storing personally identifiable information.

Read more about PasskeyBridge

Users also considered
Haventec Authenticate logo

Multi-factor protection without multi-factor friction.

learn more
Haventec Authenticate is an authentication engine for developers and product teams. It gives you the ability to add passwordless MFA to your application or enhance the security of your existing username/password authentication with a Silent MFA option that is easy to deploy and manage.

Read more about Haventec Authenticate

Users also considered
QDesk logo

Empowering Access, Redefining Privilege

learn more
QDesk provides secure, efficient, and compliant end-user access management.

Read more about QDesk

Users also considered
IdRamp  logo

Cloud-based identity and access management solution

learn more
IdRamp is a cloud-based identity and access management solution designed to help businesses manage identity verification & credential certification through decentralized information sharing. The platform enables users to protect user & administrator passwords and ensure regulatory compliance.

Read more about IdRamp

Users also considered
ManageEngine Free Active Directory Tools logo

Simplified Management & Reporting solution for AD

learn more
Active Directory FREE Tools that helps administrators efficiently handle Active Directory data.

Read more about ManageEngine Free Active Directory Tools

Users also considered
Cognito logo

No-code identity verification solution

learn more
Cognito Flow lets you verify the identity of your customers, wherever they are, in any way you need, with 20 lines of code. With documentary, data source, and liveness verifications, you can stay compliant with KYC/AML rules and improve trust and safety without sacrificing conversion rates.

Read more about Cognito

Users also considered