getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Identity Management Software - Page 5

Last updated: April 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


255 software options

CoreOne Suite logo

IT management solution for medium to large businesses

learn more
CoreOne Suite is a cloud-based and on-premise IT management solution which helps medium to large businesses manage identity, access, operations, and single sign-on. The platform enables users to automate employee entries, withdrawals, transgressions and mutations with role-based authorizations.

Read more about CoreOne Suite

Users also considered
RightCrowd Access Analytics logo

Automate your user access reviews!

learn more
Tired of difficult user access reviews? Ditch the manual spreadsheets and automate your user access reviews with RightCrowd Access Analytics.

With an automatic review process, your teams can spend less time on manual review tasks and demonstrate compliance more quickly.

Read more about RightCrowd Access Analytics

Users also considered
Atlassian Access logo

Atlassian cloud data security & governance

learn more
Atlassian Access is an enterprise-grade security solution providing centralized administration across all Atlassian cloud products, designed to help protect company data and ensure compliance.

Read more about Atlassian Access

Users also considered
Veza logo

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
BAAR-IGA logo

Automated Identity Governance and Administration

learn more
BAAR-IGA is an identity governance and administration tool that helps administer and manage who should have access, who has current access, and how the access is being used.

Read more about BAAR-IGA

Users also considered
Apache Syncope logo

Open-source identity management software

learn more
Apache Syncope is an open-source solution based on Java EE technology, which helps businesses of all sizes manage digital identities and access management operations. The platform allows organizations to manage user data across applications and systems.

Read more about Apache Syncope

Users also considered
Alice Biometrics logo

Identity verification solution

learn more
Alice Biometrics offers swift remote identity verification for businesses, enabling client onboarding in seconds via secure, AI-driven checks. Developed over a decade, Alice provides instant verification with sub-1 second responses, without manual reviews. It integrates facial recognition, liveness detection, ID reading, document validation, and AML database checks, aiding sectors like finance, mobility, hospitality, telecoms, and gaming to verify users and comply with regulations.

Read more about Alice Biometrics

Users also considered
LogonBox logo

Password and identity management software

learn more
LogonBox is a password and identity management software that helps businesses track password history, manage remote resets, handle self-service unlock, and more from within a unified platform. It enables staff members to automatically receive password expiration and system enrollment reminder notifications.

Read more about LogonBox

Users also considered
SecureONE logo

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping's high-performance directory can be deployed anywhere, is designed for scale and flexibility, and can support regulatory compliance. No matter if you perform a one-time data migration or utilize real-time, bidirectional data syncing, you can create a single source of truth for all users.

Read more about Ping Identity

Users also considered
Specops Password Policy logo

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered
PixelPin logo

Identity management and authentication software

learn more
PixelPin is a cloud-based cyber security solution designed to help businesses manage passwords using pictures to ensure safe authentication against mass phishing attacks. It lets teams use their own pictures to provide secure login into various applications and websites.

Read more about PixelPin

Users also considered
YOUZER logo

IT and SaaS account management & monitoring

learn more
Youzer is an online software that helps companies to manage the IT accounts and assets of their employees

Read more about YOUZER

Users also considered
Veriff logo

AI-verification platform with verification specialist

learn more
Veriff is an online identity verification company that protects businesses and their customers from online identity fraud. With the help of artificial intelligence, Veriff analyzes thousands of technological and behavioral variables in seconds, verifying people from 230+ countries and territories in

Read more about Veriff

Users also considered
Mvine Platform logo

Cyber-secure collaborative mobile apps & portals

learn more
Mvine creates new customer touch-points for bringing users, content, data and applications together, including identity and access management services

Read more about Mvine Platform

Users also considered
Zilla Security logo

Cloud security and threat detection platform

learn more
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered
Raw Data logo

Identity management system for agri-food industry

learn more
Raw Data RC is a cloud-based identity management application, which enables businesses in the agri-food industry to record information and authenticate workers' presence at sites, offices or warehouses through facial recognition.

Read more about Raw Data

Users also considered
IDMERIT Identity Verification logo

Verify Anyone, Anytime, Anywhere

learn more
IDMERIT is committed to delivering the most cost-effective & comprehensive global identity verification services available in the international market. Our ecosystem of identity verification services helps customers meet regulatory compliance & deliver frictionless user experiences around the world.

Read more about IDMERIT Identity Verification

Users also considered
Access Rights Manager logo

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
Password Safe logo

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
NineID logo

AI-Powered Contractor Compliance & Management Platforms

learn more
9ID is a contractor compliance platform transforming manual verification into scalable automation. We digitize the entire contractor lifecycle, ensuring every worker is authorized, certified, and compliant before arrival.

Read more about NineID

Users also considered
Unidy logo

Empowering Digital Autonomy for Organizations

learn more
UNIDY is a centralized identity management platform that enhances security, simplifies user access with Single Sign-On (SSO), and ensures GDPR compliance. Ideal for industries like sports, e-commerce, and digital publishing, UNIDY integrates seamlessly with existing systems.

Read more about Unidy

Users also considered
Symantec IGA logo

Identity and governance management platform

learn more
Symantec IGA is an identity management platform that helps businesses configure access permissions to applications, systems, and data according to requirements.

Read more about Symantec IGA

Users also considered
MIRACL Trust logo

2 second deviceless MFA on any platform or browser.

learn more
MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) that has been shown to increase customer traffic by up to 15%. Log into any mobile, desktop or even a smart TV, in 2 seconds with a success rate of up to 99.96%.

Read more about MIRACL Trust

Users also considered