getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Identity Management Software - Page 8

Last updated: April 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


239 software options

Electric AI logo

IT management software for managed software providers (MSP)

learn more
Electric is an IT management software designed to help businesses monitor network security and manage applications, operating systems, databases, and more. It allows IT teams to automate provisioning and de-provisioning of devices, monitor network inventories, launch upgrades, and review policies.

Read more about Electric AI

Users also considered
RapidIdentity logo

Identity and access management software for K-12 institutes

learn more
RapidIdentity is an identity management software that helps K-12 educational institutes manage provisioning, create user groups, configure roles, and more on a centralized platform. It enables administrators to set up single sign-on (SSO) and multi-factor authentication (MFA) to provide students with access to on-premise and cloud-based applications.

Read more about RapidIdentity

Users also considered
M365 Manager Plus logo

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
Tecalis Authentication logo

Cloud-based multi-factor authentication solution

learn more
Tecalis Authentication is a cloud-based multi-factor authentication tool that helps businesses with credential management, biometric verification, and compliance regulation.

Read more about Tecalis Authentication

Users also considered
Evidian logo

Identity and access management platform

learn more
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities.

Read more about Evidian

Users also considered
PasskeyBridge logo

Identity threat detection and response platform

learn more
PasskeyBridge is an identity threat response platform that ingests carrier signals, credentials, and biometric data to detect and neutralize security threats in real time. It executes automated playbooks to respond to incidents like SIM swaps, credential breaches, and unauthorized access. PasskeyBridge features FIDO2 passkey authentication, verifiable credentials with post-quantum cryptography, and insider threat analytics without storing personally identifiable information.

Read more about PasskeyBridge

Users also considered
Skillmine Auth logo

Multi-factor authentication and identity management solution

learn more
Skillmine Auth identity management securely controls user identities, authentication, and access across all applications and systems, ensuring only authorized users can access the right resources at the right time similar to leading IAM platforms that centralize identity and access control to simp

Read more about Skillmine Auth

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
Keystash logo

Level up your cloud IT security

learn more
Keystash is an integrated IAM and SSH Key management solution to manage users, groups, SSH Keys and SSH server security across your Linux environments.

Read more about Keystash

Users also considered
KYDSO logo

Azuring your Identity

learn more
KYDSO seamlessly integrates with Azure environments to optimize identity lifecycle processes such as onboarding, access reviews, and offboarding.

Read more about KYDSO

Users also considered
TechIDManager logo

A unique account for every tech on every domain

learn more
TechIDManager is a Privileged Access Management (PAM) tool designed for MSPs to streamline technician account creation, deactivation, permission control, password rotation, and more.

Read more about TechIDManager

Users also considered
Pyla logo

On/offboarding platform for IT teams

learn more
Pyla is a on/offboarding IT platform for SMBs and Mid-caps. It simplifies the management of hardware and software when onboarding, transfer or offboarding employees and partners.

Read more about Pyla

Users also considered
YeshID Onboard logo

Cloud-based identity management tool for growing companies.

learn more
YeshID Onboard is an identity management tool designed for organizations using Google Workspace. It enables users to streamline onboarding and offboarding processes with templates, task lists, and application provisioning.

Read more about YeshID Onboard

Users also considered
Kycaid logo

KYC&AML compliance solution for businesses

learn more
Kycaid is a one-stop-shop compliance platform with a mission to help businesses to stay compliant with regulations through AML&KYC solutions and more. Kycaid employs a holistic approach to verifying your clients' identity, from the document and biometric check to AML screening and KYB verification.

Read more about Kycaid

Users also considered
IBM Security zSecure logo

A suite of tools for security assurance and task automation

learn more
IBM Security zSecure is a suite of user authorization and compliance automation products designed to add new levels of security to a mainframe. It supports IBM Z hardware, software, virtualization, and standard enterprise security managers (ESMs). With audits, alerts, reporting, and authentication tools, this solution can enhance security while detecting internal and external threats.

Read more about IBM Security zSecure

Users also considered
ReachFive logo

SaaS CIAM: Secure identity, Access, and Omnichannel CX

learn more
ReachFive's Customer Identity Management manages the full lifecycle: flexible registration, unified profiles (omnichannel, self-service), secure auth (MFA, passwordless), and data sync via APIs. It embeds security and GDPR compliance, building trust and enabling personalized journeys.

Read more about ReachFive

Users also considered
CryptoSpike logo

Bug tracking tool to detect ransomware in storage systems.

learn more
CryptoSpike is a data transparency and cybersecurity solution that helps businesses detect malicious software and manage remediation from a centralized interface. The platform monitors real-time transactions in the storage for abnormalities relating to file extensions or user behavior.

Read more about CryptoSpike

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
Jira Oauth logo

Enable Secure Login to Jira Cloud through mO Jira OAuth

learn more
The Jira OAuth solution makes it easy for users to log in to Jira with their OAuth 2.0 credentials and OpenID Connect credentials.

Integrate your custom OAuth Provider with Atlassian Access to ensure seamless SSO.

Read more about Jira Oauth

Users also considered
Unified PAM MSP logo

Privileged access management solution for MSPs

learn more
Securden Unified PAM MSP is a privileged access management solution tailored specifically for IT service providers. The solution is the result of extensive collaboration with top MSPs, addressing their most pressing challenges head-on.

Read more about Unified PAM MSP

Users also considered
Socure logo

The Leader in Digital ID Verification & Trust.

learn more
Socure ID+ is a identity verification platform for the largest enterprises and is trusted by 4 of the 5 largest banks, 7 of the 10 largest credit card issuers, top Buy Now, Pay Later (BNPL) providers, top crypto exchanges, and the largest online gaming operators.

Read more about Socure

Users also considered
swIDch PLC-OTAC logo

Dynamic, Passwordless Security for Industrial Control

learn more
PLC-OTAC by swIDch is a single-step multi-factor authentication solution that utilizes dynamic one-time authentication codes to significantly increase security for programmable logic controllers (PLCs) with minimal disruption and computing requirements. This technology neutralizes common PLC vulnerabilities such as default passwords, password sharing, and credential theft, providing a highly secure and streamlined authentication process.

Read more about swIDch PLC-OTAC

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered
KYC Hub logo

Cloud-based and on-premise solution for KYC compliance.

learn more
KYC Hub is a cloud-based and on-premise solution, which helps businesses in finance, gaming, real estate, and other sectors streamline the identity verification process for their customer. The platform offers various features such as AML compliance, document management, ongoing monitoring, liveness detection, reporting, video analysis, and more. KYC Hub also facilitates two-way integration with various applications via APIs.

Read more about KYC Hub

Users also considered
ManageEngine Free Active Directory Tools logo

Simplified Management & Reporting solution for AD

learn more
Active Directory FREE Tools that helps administrators efficiently handle Active Directory data.

Read more about ManageEngine Free Active Directory Tools

Users also considered