getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Customer Identity and Access Management (CIAM) Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


61 software options

Microsoft Entra ID logo

Cloud-based identity and access management (IAM) software

learn more
Azure Active Directory, part of Microsoft Entra, is an identity and access management (IAM) software designed to help enterprises provide protection against cybersecurity attacks through single sign-on (SSO) and multi-factor authentication. It allows administrators to securely engage with internal and external stakeholders and provide on-site and remote access to various applications.

Read more about Microsoft Entra ID

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping's CIAM solution innovates how you engage your customers by delivering seamless and secure digital experiences. Don't let long registration forms, forgotten passwords, scattered user data, and disjointed experiences frustrate your customers.

Read more about Ping Identity

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
Advanced Entry logo

Visitor Management For Healthcare Facilities

learn more
Advanced Entry Fully contactless sign-in Kiosk for visitor/staff management, to ease the sign-in process and reduce front-desk labor costs for Healthcare facilities

Read more about Advanced Entry

Users also considered
Sumsub logo

Technical and legal solution for all KYC/AML requirements

learn more
Sumsub is an identity verification platform designed for KYC/AML needs.

Read more about Sumsub

Users also considered
Okta logo

On-demand identity & access management for enterprise

learn more
Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta.

Read more about Okta

Users also considered
Cisco Duo logo

Cloud-based identity security and access management

learn more
Cisco Duo is a cloud-based identity security solution that secures access to your critical resources for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem, whether multi-cloud, hybrid, or on-premises.

Read more about Cisco Duo

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Reemo logo

Secure Remote Desktop

learn more
High-performance and secure remote access to physical and virtual desktops with near-zero latency directly from a browser. It supports 4K resolution at 60FPS with 4:4:4 chroma across multiple monitors, making it ideal for demanding environments.

Read more about Reemo

Users also considered
Entrust IDV logo

Digital identity made simple

learn more
Onfido's Real Identity Platform is an end-to-end, AI powered identity verification solution that helps businesses seamlessly onboard customers while stopping fraud, and navigating regulatory requirements.

Read more about Entrust IDV

Users also considered
Token of Trust logo

Identity verification solution for safe online transactions

learn more
Token of Trust is a cloud-based anti-money laundering solution designed to help online merchants authenticate data and validate the identity of individuals. It collects information from multiple sources in a unified database, letting users associate behavior with real & identifiable people.

Read more about Token of Trust

Users also considered
SAP Access Control logo

Access management software with batch risk analysis

learn more
SAP Access Control is a hybrid and on-premise access management software designed to help businesses in the energy and natural resources, financial services, consumer, public services, and other industries automate processes related to detection and prevention of access risk violations to reduce unauthorized access to critical information and data.

Read more about SAP Access Control

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

learn more
ManageEngine ADManager Plus is an IGA solution unifying AD, Exchange, Google Workspace, and Microsoft 365 management. It simplifies the identity life cycle, risk assessment, access certification, and compliance reporting with features like automation and delegation.

Read more about ManageEngine ADManager Plus

Users also considered
Unidy logo

Empowering Digital Autonomy for Organizations

learn more
UNIDY is a centralized identity management platform that enhances security, simplifies user access with Single Sign-On (SSO), and ensures GDPR compliance. Ideal for industries like sports, e-commerce, and digital publishing, UNIDY integrates seamlessly with existing systems.

Read more about Unidy

Users also considered
miniOrange logo

One solution for billions of Identity & Access needs.

learn more
miniOrange is a identity and access management (IAM) provider for businesses to make any IAM feature applicable such as SSO, MFA, Provisioning, Brokering, etc. on any application across the internet.

Read more about miniOrange

Users also considered
WSO2 Identity Server logo

CIAM Beyond Access Management

learn more
WSO2 Identity Server provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce IAM requirements.

Read more about WSO2 Identity Server

Users also considered
SAP Customer Data Cloud logo

Enhance customer experiences.

learn more
SAP Customer Data Cloudenhances customer experiences across marketing, commerce, sales, and service helping you understand your customers and deliver relevant, trusted, and personalized engagements.

Read more about SAP Customer Data Cloud

Users also considered
LoginRadius logo

Customer Identity and Access Management Platform

learn more
LoginRadius is a leading Customer Identity and Access Management (CIAM) platform to help businesses create a single view of their users. Organizations can leverage LoginRadius to securely manage customer identities via single sign-on (SSO), multi-factor authentication (MFA), and more.

Read more about LoginRadius

Users also considered
RapidIdentity logo

Identity and access management software for K-12 institutes

learn more
RapidIdentity is an identity management software that helps K-12 educational institutes manage provisioning, create user groups, configure roles, and more on a centralized platform. It enables administrators to set up single sign-on (SSO) and multi-factor authentication (MFA) to provide students with access to on-premise and cloud-based applications.

Read more about RapidIdentity

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered
Haventec Authenticate logo

Multi-factor protection without multi-factor friction.

learn more
Haventec Authenticate is an authentication engine for developers and product teams. It gives you the ability to add passwordless MFA to your application or enhance the security of your existing username/password authentication with a Silent MFA option that is easy to deploy and manage.

Read more about Haventec Authenticate

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Clavister IdAuth Cloud logo

Secure, cloud-based identity and authentication platform

learn more
Clavister IdAuth Cloud is a secure, cloud-based identity and authentication platform that delivers strong authentication, centralized identity management, and Zero Trust access control for modern IT and OT environments.

Read more about Clavister IdAuth Cloud

Users also considered
OpenText Identity and Access Management logo

On-premise and cloud-based CIAM solution

learn more
OpenText Identity and Access Management is a cloud-based identity and access management (CIAM) solution that helps companies manage user identities, applications, and other data across the organization. It helps companies create secure user accounts, manage password complexity and expiration, protect sensitive information from unauthorized access and misuse, provide single sign-on capabilities for multiple systems with different authentication methods, and more.

Read more about OpenText Identity and Access Management

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered