getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Access Governance Software with Credential Management (2026) - Page 2

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


50 software options

Infisign logo

Cloud-based identity and access management (IAM) solution

learn more
Infisign stands at the forefront of Identity and Access Management (IAM) solutions, driven by a zero-trust philosophy that offers increased security and privacy control for all authentication requirements for organizations of all sizes.

Read more about Infisign

Users also considered
Entrust Identity as a Service logo

Identity & access management solution

learn more
Entrust IDaaS is a cloud-based IAM solution designed to help organizations of all sizes deploy multi-factor authentication for accessing networks, devices, and applications. Key features include single sign-on, IAM, virtual smart cards, workflow automation, user group and identity management.

Read more about Entrust Identity as a Service

Users also considered
Uniqkey logo

More than Just a Business Password Manager

learn more
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.

Read more about Uniqkey

Users also considered
Amazon Cognito logo

User authentication and access management software

learn more
Amazon Cognito is an authentication management software designed to help businesses manage user sign-up, sign-in, and access to mobile and web applications via a unified portal. The platform enables users to sign in using enterprise identity providers like OpenID Connect, and SAML 2.0 and various social identity providers such as Amazon, Apple, Google, and Facebook.

Read more about Amazon Cognito

Users also considered
Userfront logo

Auth without complexity

learn more
Userfront is the premier auth & identity platform for growing SaaS companies.

Start free, move fast, and scale all the way to Fortune 500 enterprise customers, all in one place.

Read more about Userfront

Users also considered
Access Rights Manager logo

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
Netwrix Privilege Secure logo

Access management software

learn more
Netwrix SbPAM helps improve IT productivity and service uptime with centralized privileged account management.

Read more about Netwrix Privilege Secure

Users also considered
Kinde logo

Modern auth, access management and billing for engineers.

learn more
The fully integrated developer platform. Modern auth, access management and billing for engineers.

Read more about Kinde

Users also considered
MIA logo

Saas management tool for small and medium businesses (SMB)

learn more
MIA is a cloud-based software that streamlines SaaS and user access management for small and medium businesses (SMB). It helps track subscriptions, control who has access to business data, and more.

Read more about MIA

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Soffid IAM logo

The Future of IAM is here and it's converged

learn more
Soffid IAM is a Converged IAM Platform that brings Access Management (AM), Identity Governance (IGA) and Privileged Account Management (PAM) in one comprehensive platform. Soffid enables fast and accurate user provisioning, role-based access management, reporting and analytics.

Read more about Soffid IAM

Users also considered
Carbon Black App Control logo

Endpoint protection and network access management software

learn more
Carbon Black App Control is a endpoint protection software that helps businesses track compliance, set up device control, ensure malware protection, and manage other operations. It allows staff members to combine file integrity monitoring, device control, memory protection, application control, and tamper protection on a centralized platform.

Read more about Carbon Black App Control

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Efecte IGA logo

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte IGA

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Appsian Security Platform logo

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden delivers advanced Access Governance to unify control over identities, access, and privileges across hybrid IT. Gain real-time visibility, enforce least-privilege policies, automate approvals, and meet compliance with integrated auditing and monitoring.

Read more about Securden

Users also considered
SafeNet Trusted Access logo

Secure access to all apps with authentication everywhere

learn more
SafeNet Trusted Access provides flexible access management, giving customers real-time control over the capacity to enforce policies at the individual user, group, or application level. The policy engine allows leverage of existing investments to secure cloud & web-based applications.

Read more about SafeNet Trusted Access

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Enforce Zero Trust in your organization by providing Just-in-Time access to privileged data and credentials to users based on their roles. Elevate applications on a need basis, and revoke administrative access. Grant remote access to devices and applications without revealing login credentials.

Read more about Securden Unified PAM

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
Luchismart logo

Cloud-based access control and time tracking solution

learn more
Harnessing the power of the cloud, Luchismart offers a range of state-of-the-art access control solutions that leverage advanced encryption and authentication mechanisms to ensure the highest level of security.

Read more about Luchismart

Users also considered
ReachFive logo

SaaS CIAM: Secure identity, Access, and Omnichannel CX

learn more
ReachFive centralizes Customer Access Governance, enabling businesses to define & enforce access policies. It manages identities & auth for consistent authorization, and securely governs third-party app access (OAuth 2.0), ensuring secure, compliant, & trustworthy digital experiences.

Read more about ReachFive

Users also considered
CloudGate logo

CloudGate Workplace Experience Platform

learn more
Embark on CloudGate's digital identity journey, where every individual's access lifecycle is seamlessly managed. From the initial onboarding to the final farewell, our platform ensures secure and efficient management of digital identities. Mobile Credentials by CloudGate offer seamless access.

Read more about CloudGate

Users also considered
Keyfactor Signum logo

Delivering full-scale secure code signing as a service.

learn more
Keyfactor Signum is a secure code signing service that protects the integrity of software and CI/CD environments. It stores private signing keys in a FIPS 140-2 certified hardware security module while providing security teams with comprehensive visibility and policy enforcement capabilities. The platform integrates seamlessly with existing signing tools through lightweight agents for Windows and Linux, enabling developers to maintain productivity without compromising security protocols.

Read more about Keyfactor Signum

Users also considered