getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Access Governance Software - Page 2

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


104 software options

Satori logo

Set your data free

learn more
Satori enables secure self-service access to data, accelerating value from data. This is done while meeting data security and compliance requirements in a simple way.

Read more about Satori

Users also considered
RightCrowd Access Analytics logo

Automate your user access reviews!

learn more
Tired of difficult user access reviews? Ditch the manual spreadsheets and automate your user access reviews with RightCrowd Access Analytics.

With an automatic review process, your teams can spend less time on manual review tasks and demonstrate compliance more quickly.

Read more about RightCrowd Access Analytics

Users also considered
Veza logo

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
Soffid IAM logo

The Future of IAM is here and it's converged

learn more
Soffid IAM is a Converged IAM Platform that brings Access Management (AM), Identity Governance (IGA) and Privileged Account Management (PAM) in one comprehensive platform. Soffid enables fast and accurate user provisioning, role-based access management, reporting and analytics.

Read more about Soffid IAM

Users also considered
Atlassian Access logo

Atlassian cloud data security & governance

learn more
Atlassian Access is an enterprise-grade security solution providing centralized administration across all Atlassian cloud products, designed to help protect company data and ensure compliance.

Read more about Atlassian Access

Users also considered
AccessOwl logo

Cloud-based access management and governance software

learn more
AccessOwl is an identity governance and access management platform that automates user provisioning and de-provisioning. It provides a live view of user accounts and permissions across SaaS applications. AccessOwl enables access requests, approval workflows, and access reviews to strengthen compliance. The software integrates with HRIS systems for automated onboarding and offboarding.

Read more about AccessOwl

Users also considered
Venn logo

Secure Remote Workspace

learn more
Venn secures remote work on any unmanaged or BYOD computer with a radically simplified and less costly solution than VDI.

Read more about Venn

Users also considered
Infisign logo

Cloud-based identity and access management (IAM) solution

learn more
Infisign stands at the forefront of Identity and Access Management (IAM) solutions, driven by a zero-trust philosophy that offers increased security and privacy control for all authentication requirements for organizations of all sizes.

Read more about Infisign

Users also considered
OpenText Identity Manager logo

Identity management and access governance solution

learn more
NetIQ Identity Manager is a comprehensive identity and access management solution offered by Micro Focus. It is designed to help organizations manage user identities and access permissions across the enterprise, ensuring that only authorized users have access to sensitive data and applications.

Read more about OpenText Identity Manager

Users also considered
SecurEnds Identity Governance and Access Control logo

Governance, risk, and compliance management software

learn more
SecurEnds Identity Governance and Access Control solution allows organizations to detect, monitor, and manage access to sensitive data by employees and third parties. The solution helps organizations meet the need to identify individuals across all systems, applications, and channels, and ensure compliance with regulatory guidelines.

Read more about SecurEnds Identity Governance and Access Control

Users also considered
FusionAuth logo

Identity without Constraints

learn more
FusionAuth provides role-based access control with roles embedded in JWTs at login, group-based role inheritance, and entity-based permissions for complex models. Fine-grained authorization via FusionAuth FGA supports ABAC and ReBAC with sub-10ms checks. Deploy anywhere with full control.

Read more about FusionAuth

Users also considered
B-Line logo

Transforming the way workplaces are managed

learn more
B-Line is a flexible workplace management and security platform that helps asset managers and employers manage their hybrid workplace with digital access, flex management, and ongoing capacity monitoring and space utilization analytics.

Read more about B-Line

Users also considered
Access Rights Manager logo

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
Zilla Security logo

Cloud security and threat detection platform

learn more
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping’s web/API access solution enables organizations to:
● Phase off their WAM solution at their own pace without a rip-and-replace approach
● Secure access across large, multi-generational hybrid IT environments
● Protect access to the ever-growing number of APIs

Read more about Ping Identity

Users also considered
Carbon Black App Control logo

Endpoint protection and network access management software

learn more
Carbon Black App Control is a endpoint protection software that helps businesses track compliance, set up device control, ensure malware protection, and manage other operations. It allows staff members to combine file integrity monitoring, device control, memory protection, application control, and tamper protection on a centralized platform.

Read more about Carbon Black App Control

Users also considered
The OptimalCloud logo

Cloud-based identity and access management software

learn more
The OptimalCloud helps organizations manage and provide secure access to various applications using single sign-on (SSO) capability. Users can submit registration requests, reset passwords, delegate administrative tasks to members across teams, and approve workflows via a unified portal.

Read more about The OptimalCloud

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
Florbs logo

Accelerate your Google Workspace management

learn more
Florbs is an official Google Cloud Partner with a mission to streamline businesses' operations in Google Workspace. Our solutions include: Admin Automation for powerful user lifecycle workflows, Email Signature Management for brand consistency, and Security & Auditing to secure data in Google Drive.

Read more about Florbs

Users also considered
Heimdal Application Control logo

Application Whitelisting and Blacklisting Made Simple.

learn more
Heimdal Application Control is a novel approach to application control that makes app whitelisting and blacklisting simple with rule-based frameworks and auto-approval flows. Designed to integrate seamlessly with a PAM solution, it is the ideal enhancement to your company's security.

Read more about Heimdal Application Control

Users also considered
Netwrix Directory Manager logo

Directory group & user management software

learn more
Netwrix GroupID is a group and user management software that streamlines directory management to increase IT productivity and enhance security. It automates group and user provisioning, deprovisioning, and attestation workflows to ensure accurate group memberships and minimize the attack surface. Netwrix GroupID also allows businesses to delegate group management to owners, reducing the IT workload while empowering users to request the access they need.

Read more about Netwrix Directory Manager

Users also considered
AccessHub logo

One Platform. Total Control. Seamless Access Governance.

learn more
AccessHub.AI reduces access risk, audit gaps, and compliance exposure by governing users, roles, and entitlements with clear ownership, automated approvals, lifecycle automation, and full traceability across SAP, S/4HANA, and hybrid enterprise environments.

Read more about AccessHub

Users also considered
Amazon Cognito logo

User authentication and access management software

learn more
Amazon Cognito is an authentication management software designed to help businesses manage user sign-up, sign-in, and access to mobile and web applications via a unified portal. The platform enables users to sign in using enterprise identity providers like OpenID Connect, and SAML 2.0 and various social identity providers such as Amazon, Apple, Google, and Facebook.

Read more about Amazon Cognito

Users also considered
Heimdal Privileged Access Management logo

Escalate and de-escalate user rights and manage permissions.

learn more
Heimdal Privileged Access Management is a PAM solution that allows sysadmins to view and check escalation requests, as well as approve or decline them on the go. Available in both the dashboard tab and on mobile, it is the ideal tool for full granular visibility into the company network.

Read more about Heimdal Privileged Access Management

Users also considered