App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Access Governance Software - Page 3

90 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
OpenText Storage Manager logo

OpenText Storage Manager

(0)

Access governance solution

learn more
OpenText Storage Manager is an access governance solution that allows businesses to automate the management of their Open Enterprise Server network file systems and user group storage.

Read more about OpenText Storage Manager

Users also considered
Kinde logo

Kinde

5.0
(1)

Simple, powerful authentication that integrates in minutes.

learn more
Kinde is a cloud-based software infrastructure provider for modern applications. Its offering spans authentication, user management, release management, and billing, all in one place and easily implemented for any tech stack.

Read more about Kinde

Users also considered
Efecte Identity, Governance and Administration logo

Efecte Identity, Governance and Administration

(0)

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte Identity, Governance and Administration

Users also considered
Clear Skye IGA logo

Clear Skye IGA

(0)

ServiceNow-powered identity governance and administration

learn more
Built on ServiceNow, Clear Skye IGA is an identity governance and administration solution that streamlines access requests and reviews across the enterprise with flexible workflow automation.

Read more about Clear Skye IGA

Users also considered
Appsian Security Platform logo

Appsian Security Platform

(0)

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered
strongDM logo

strongDM

(0)

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
SafeNet Trusted Access logo

SafeNet Trusted Access

(0)

Secure access to all apps with authentication everywhere

learn more
SafeNet Trusted Access provides flexible access management, giving customers real-time control over the capacity to enforce policies at the individual user, group, or application level. The policy engine allows leverage of existing investments to secure cloud & web-based applications.

Read more about SafeNet Trusted Access

Users also considered
Privileged Account Manager logo

Privileged Account Manager

(0)

Access Governance redefined for Hybrid environments

learn more
Enforce Zero Trust in your organization by providing Just-in-Time access to privileged data and credentials to users based on their roles. Elevate applications on a need basis, and revoke administrative access. Grant remote access to devices and applications without revealing login credentials.

Read more about Privileged Account Manager

Users also considered
Descope logo

Descope

(0)

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
CloudHealth Secure State logo

CloudHealth Secure State

(0)

Security platform

learn more
Secure State is a comprehensive solution that enables user-friendly security management across cloud and Kubernetes environments

Read more about CloudHealth Secure State

Users also considered
Systancia Identity logo

Systancia Identity

(0)

Identity governance and administration software

learn more
Systancia Identity is an identity governance and administration product (IGA). It provides a repository of workforce identities and manages their authorizations, ensuring perfect consistency between your HR and production IS.

Read more about Systancia Identity

Users also considered
Adapt logo

Adapt

(0)

Frictionless logins: when the credentials and user match.

learn more
ADAPT is a standards-based login MFA platform that provides added login security without additional devices. It uses behavioral biometrics and other ambient signals to authenticate users at the point of login.

Read more about Adapt

Users also considered
symplr Access logo

symplr Access

(0)

Vendor credentialing and access management software

learn more
Maintain compliance and accreditation: symplr helps you manage, track, and report on all vendor interactions at your facility.

Read more about symplr Access

Users also considered
Advanced Cloud Security logo

Advanced Cloud Security

(0)

Control Users Access in Dynamics 365 Business Central

learn more
The Advanced Cloud Security App empowers users with better visibility and control of user access to information and facilitates a seamless user experience for end-users in Dynamics 365 Business Central.

Read more about Advanced Cloud Security

Users also considered
EmpowerID logo

EmpowerID

(0)

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
External User Manager logo

External User Manager

(0)

Security & compliance with guest users in Microsoft Teams

learn more
With External User Manager, keep control of guest users in Microsoft Teams with a request & approval workflow, mandatory onboarding to sign required agreements or rules, and a lifecycle process to regularly check if access is still required.

Read more about External User Manager

Users also considered
YESOD logo

YESOD

(0)

SaaS management platform to integrate business operations

learn more
YESOD is a cloud-based SaaS management platform for integrating various business operations scattered in different departments and branches, allowing users to customize various features relevant to their company. Additionally, the platform allows users to personalize information delivery to ensure only authorized people have access. The platform is designed for Japanese companies with multiple departments.

Read more about YESOD

Users also considered
Freedom Cloud ACaaS logo

Freedom Cloud ACaaS

(0)

Cloud-based access control software

learn more
Freedom Cloud is a cloud-based access control software, designed to help organizations across government, aviation, education, healthcare and several other sectors control, monitor, manage and maintain physical access control systems (PACS).

Read more about Freedom Cloud ACaaS

Users also considered
Securden logo

Securden

(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
ManageEngine AD360 logo

ManageEngine AD360

(0)

Identity and access management platform

learn more
ManageEngine AD360 is an enterprise IAM software solution that helps businesses of all sizes manage identities securely and ensure compliance. Key functionalities include automated identity lifecycle management, secure single sign-on, adaptive multi-factor authentication, approval-based workflows.

Read more about ManageEngine AD360

Users also considered
VISULOX Remote Support logo

VISULOX Remote Support

(0)

Cloud- based remote support software

learn more
The software has a built-in chat feature that allows employees and customers to communicate with each other during a session.

Read more about VISULOX Remote Support

Users also considered
Cyberelements logo

Cyberelements

(0)

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
Luchismart logo

Luchismart

(0)

Cloud-based access control and time tracking solution

learn more
Harnessing the power of the cloud, Luchismart offers a range of state-of-the-art access control solutions that leverage advanced encryption and authentication mechanisms to ensure the highest level of security.

Read more about Luchismart

Users also considered
Aserto logo

Aserto

(0)

Fine-grained access control for applications and APIs

learn more
Aserto is an application authorization platform. It makes it easy for developers to add fine-grained, real-time access controls to their applications/APIs. It also future-proofs that app, as Aserto support every authorization model (RBAC, ABAC, ReBAC, or any other BAC.

Read more about Aserto

Users also considered