getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Access Governance Software - Page 4

Last updated: March 2026

103 software options

EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Freedom Cloud ACaaS logo

Cloud-based access control software

learn more
Freedom Cloud is a cloud-based access control software, designed to help organizations across government, aviation, education, healthcare and several other sectors control, monitor, manage and maintain physical access control systems (PACS).

Read more about Freedom Cloud ACaaS

Users also considered
Faronics WINSelect logo

Cloud-based user access and cyber security management tool

learn more
Faronics WINSelect helps organizations configure Windows computers to prevent unauthorized usage and ensure that their staff can only perform necessary functions with them. Key features include user experience management, secure workstations, standard user environments, and intervention management.

Read more about Faronics WINSelect

Users also considered
External User Manager logo

Security & compliance with guest users in Microsoft Teams

learn more
With External User Manager, keep control of guest users in Microsoft Teams with a request & approval workflow, mandatory onboarding to sign required agreements or rules, and a lifecycle process to regularly check if access is still required.

Read more about External User Manager

Users also considered
UnityIS logo

Access control and governance in the cloud

learn more
Powerful cloud solution for all security management needs.

Read more about UnityIS

Users also considered
Daito logo

Web-based authenticator for TOTP

learn more
Easily manage 2FA for shared accounts with a web-based TOTP authenticator.

Read more about Daito

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Enforce Zero Trust in your organization by providing Just-in-Time access to privileged data and credentials to users based on their roles. Elevate applications on a need basis, and revoke administrative access. Grant remote access to devices and applications without revealing login credentials.

Read more about Securden Unified PAM

Users also considered
Clear Skye IGA logo

ServiceNow-powered identity governance and administration

learn more
Built on ServiceNow, Clear Skye IGA is an identity governance and administration solution that streamlines access requests and reviews across the enterprise with flexible workflow automation.

Read more about Clear Skye IGA

Users also considered
Appsian Security Platform logo

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered
YESOD logo

SaaS management platform to integrate business operations

learn more
YESOD is a cloud-based SaaS management platform for integrating various business operations scattered in different departments and branches, allowing users to customize various features relevant to their company. Additionally, the platform allows users to personalize information delivery to ensure only authorized people have access. The platform is designed for Japanese companies with multiple departments.

Read more about YESOD

Users also considered
SafeNet Trusted Access logo

Secure access to all apps with authentication everywhere

learn more
SafeNet Trusted Access provides flexible access management, giving customers real-time control over the capacity to enforce policies at the individual user, group, or application level. The policy engine allows leverage of existing investments to secure cloud & web-based applications.

Read more about SafeNet Trusted Access

Users also considered
TrustLogin logo

Cloud-based SSO and identity management software

learn more
TrustLogin is an IDaaS (Identity as a Service) solution that provides single sign-on (SSO) and centralized management of user identities and passwords for various cloud services, including Google Workspace (formerly G Suite), Microsoft 365 (formerly Office 365), Cybozu, Salesforce, and more.

Read more about TrustLogin

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
Faronics WINSelect logo

Cloud-based user access and cyber security management tool

learn more
Faronics WINSelect helps organizations configure Windows computers to prevent unauthorized usage and ensure that their staff can only perform necessary functions with them. Key features include user experience management, secure workstations, standard user environments, and intervention management.

Read more about Faronics WINSelect

Users also considered
External User Manager logo

Security & compliance with guest users in Microsoft Teams

learn more
With External User Manager, keep control of guest users in Microsoft Teams with a request & approval workflow, mandatory onboarding to sign required agreements or rules, and a lifecycle process to regularly check if access is still required.

Read more about External User Manager

Users also considered
Daito logo

Web-based authenticator for TOTP

learn more
Easily manage 2FA for shared accounts with a web-based TOTP authenticator.

Read more about Daito

Users also considered
YESOD logo

SaaS management platform to integrate business operations

learn more
YESOD is a cloud-based SaaS management platform for integrating various business operations scattered in different departments and branches, allowing users to customize various features relevant to their company. Additionally, the platform allows users to personalize information delivery to ensure only authorized people have access. The platform is designed for Japanese companies with multiple departments.

Read more about YESOD

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Enforce Zero Trust in your organization by providing Just-in-Time access to privileged data and credentials to users based on their roles. Elevate applications on a need basis, and revoke administrative access. Grant remote access to devices and applications without revealing login credentials.

Read more about Securden Unified PAM

Users also considered
SafeNet Trusted Access logo

Secure access to all apps with authentication everywhere

learn more
SafeNet Trusted Access provides flexible access management, giving customers real-time control over the capacity to enforce policies at the individual user, group, or application level. The policy engine allows leverage of existing investments to secure cloud & web-based applications.

Read more about SafeNet Trusted Access

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
SeciossLink logo

Integrated ID management for secure access.

learn more
SeciossLink is an IDaaS that enables integrated ID management, single sign-on (SSO), multi-factor authentication (MFA), access restrictions, and other security measures. It consolidates account information for employees, students, and more to balance convenience and security with SSO and MFA.

Read more about SeciossLink

Users also considered
Privacera logo

Cloud data access governance and compliance platform

learn more
Privacera is the cloud-based platform that helps businesses streamline data security governance processes.

Read more about Privacera

Users also considered
Netwrix Identity Manager logo

Identity governance & administration (IGA) solution

learn more
Netwrix Usercube is a SaaS-based identity governance and administration (IGA) solution that automates, governs, and controls enterprise identities. It ensures users have the right access to the right things at the right time, enables business owners to grant access without IT assistance. Netwrix Usercube also provides automated attestation campaigns and compliance reports.

Read more about Netwrix Identity Manager

Users also considered
OneIdP logo

Access governance and authentication solution

learn more
Enable secure and seamless Single Sign-On (SSO) with conditional access policies, device trust validation, and integration with external directories.

Read more about OneIdP

Users also considered