App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Access Governance Software - Page 2

89 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

ManageEngine Password Manager Pro logo

ManageEngine Password Manager Pro

4.4
(22)

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
Florbs logo

Florbs

4.8
(11)

Accelerate your Google Workspace management

learn more
Florbs is an official Google Cloud Partner with a mission to streamline businesses' operations in Google Workspace. Our solutions include: Admin Automation for powerful user lifecycle workflows, Email Signature Management for brand consistency, and Security & Auditing to secure data in Google Drive.

Read more about Florbs

Users also considered
Contentverse logo

Contentverse

4.1
(19)

You're never far from everything you need.

learn more
Contentverse is your all-in-one content and business process management solution. Easily upload files and find them when you need them. Securely share documents with colleagues and external parties. And run processes to collaborate with your remote team. You're never far from everything you need.

Read more about Contentverse

Users also considered
SecurEnds Identity Governance and Access Control logo

SecurEnds Identity Governance and Access Control

4.8
(9)

Governance, risk, and compliance management software

learn more
SecurEnds Identity Governance and Access Control solution allows organizations to detect, monitor, and manage access to sensitive data by employees and third parties. The solution helps organizations meet the need to identify individuals across all systems, applications, and channels, and ensure compliance with regulatory guidelines.

Read more about SecurEnds Identity Governance and Access Control

Users also considered
Authfy logo

Authfy

4.9
(7)

CIAM; IAM; Passwordless; MFA; Identity; Authentication

learn more
Authfy improves the experience of customers and employees, unifying the entire onboard journey (KYC), transactions and fraud prevention, in a safe, simple and intuitive way

Read more about Authfy

Users also considered
Portnox CLEAR logo

Portnox CLEAR

4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
NetIQ Identity Manager logo

NetIQ Identity Manager

4.8
(5)

Identity management and access governance solution

learn more
NetIQ Identity Manager is a comprehensive identity and access management solution offered by Micro Focus. It is designed to help organizations manage user identities and access permissions across the enterprise, ensuring that only authorized users have access to sensitive data and applications.

Read more about NetIQ Identity Manager

Users also considered
Entrust Identity as a Service logo

Entrust Identity as a Service

5.0
(4)

Identity & access management solution

learn more
Entrust IDaaS is a cloud-based IAM solution designed to help organizations of all sizes deploy multi-factor authentication for accessing networks, devices, and applications. Key features include single sign-on, IAM, virtual smart cards, workflow automation, user group and identity management.

Read more about Entrust Identity as a Service

Users also considered
AppviewX CERT+ logo

AppviewX CERT+

5.0
(4)

AppViewX CERT+ Simplifies Certificate Lifecycle Management

learn more
AppViewX CERT+ is a ready-to-consume, scalable, and efficient certificate lifecycle management (CLM) solution to effectively automate and manage machine and application identities as an integral part of your cybersecurity strategy.

Read more about AppviewX CERT+

Users also considered
NOLA logo

NOLA

4.8
(4)

Auto dialer solution for call centers and debt collectors

learn more
NOLA AUTOMATION is an auto dialer solution that helps call centers communicate with customers via various methods including outbound or inbound calls, SMS, emails, live chat, and more. It allows sales teams to analyze customer journey by targeting leads or customers and creating strategic plans.

Read more about NOLA

Users also considered
Amazon Cognito logo

Amazon Cognito

4.5
(4)

User authentication and access management software

learn more
Amazon Cognito is an authentication management software designed to help businesses manage user sign-up, sign-in, and access to mobile and web applications via a unified portal. The platform enables users to sign in using enterprise identity providers like OpenID Connect, and SAML 2.0 and various social identity providers such as Amazon, Apple, Google, and Facebook.

Read more about Amazon Cognito

Users also considered
Access Rights Manager logo

Access Rights Manager

4.7
(3)

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
Ermetic logo

Ermetic

5.0
(2)

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Ermetic

Users also considered
AWS Organizations logo

AWS Organizations

5.0
(2)

Account Governance for AWS Organizations

learn more
AWS Organizations is a managed service that helps users provision and manages new AWS accounts and apply policies to those accounts to achieve fine-grained governance.

Read more about AWS Organizations

Users also considered
Heimdal Application Control logo

Heimdal Application Control

4.0
(2)

Application Whitelisting and Blacklisting Made Simple.

learn more
Heimdal Application Control is a novel approach to application control that makes app whitelisting and blacklisting simple with rule-based frameworks and auto-approval flows. Designed to integrate seamlessly with a PAM solution, it is the ideal enhancement to your company's security.

Read more about Heimdal Application Control

Users also considered
Venafi Trust Protection Platform logo

Venafi Trust Protection Platform

5.0
(1)

Cloud-based cybersecurity platform

learn more
Venafi is a cloud-based cybersecurity platform that helps in identity management and securing machine-to-machine connections and communications.

Read more about Venafi Trust Protection Platform

Users also considered
Versio.io logo

Versio.io

5.0
(1)

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Veza logo

Veza

5.0
(1)

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
PowerAuth logo

PowerAuth

5.0
(1)

Modern Authentication for Financial Apps. Deployed in a Snap

learn more
Provide your customers with the fastest and most secure access and transaction signing with passwordless strong customer authentication (SCA). Deploy in a snap and turn your app into a secure doorway to digital finance. PowerAuth can be a standalone mobile token app or a plugin for mobile banking.

Read more about PowerAuth

Users also considered
ZertID logo

ZertID

5.0
(1)

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Teleport logo

Teleport

5.0
(1)

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Soffid IAM logo

Soffid IAM

5.0
(1)

The Future of IAM is here and it's converged

learn more
Soffid IAM is a Converged IAM Platform that brings Access Management (AM), Identity Governance (IGA) and Privileged Account Management (PAM) in one comprehensive platform. Soffid enables fast and accurate user provisioning, role-based access management, reporting and analytics.

Read more about Soffid IAM

Users also considered
Carbon Black App Control logo

Carbon Black App Control

4.0
(1)

Endpoint protection and network access management software

learn more
Carbon Black App Control is a endpoint protection software that helps businesses track compliance, set up device control, ensure malware protection, and manage other operations. It allows staff members to combine file integrity monitoring, device control, memory protection, application control, and tamper protection on a centralized platform.

Read more about Carbon Black App Control

Users also considered
The OptimalCloud logo

The OptimalCloud

4.0
(1)

Cloud-based identity and access management software

learn more
The OptimalCloud helps organizations manage and provide secure access to various applications using single sign-on (SSO) capability. Users can submit registration requests, reset passwords, delegate administrative tasks to members across teams, and approve workflows via a unified portal.

Read more about The OptimalCloud

Users also considered
remote.it logo

remote.it

(0)

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered