getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Identity Management Software with Access Management (2026) - Page 8

Last updated: April 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


201 software options

CloudEagle logo

A unified platform for SaaS security, identity governance.

learn more
CloudEagle.ai is an AI-powered SaaS Management, Identity Governance, and Security platform that gives enterprises a unified command center to discover, govern, secure, and optimize their entire SaaS and AI ecosystem.
Modern IT and security teams face a compounding problem: SaaS sprawl, shadow AI ado

Read more about CloudEagle

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Zoho Directory logo

Workforce identity and access management solution for cloud.

learn more
Zoho Directory is a workforce identity and access management software that helps IT admins manage user identities, apps, and devices in a central location.

Read more about Zoho Directory

Users also considered
Enso logo

Cloud-based & on-premise tool for identity management.

learn more
Enso is an identity management and workflow software that helps businesses manage onboarding, cross-boarding, and offboarding processes on a centralized interface.

Read more about Enso

Users also considered
Corpia logo

Identity & access management solution across IT environments

learn more
Corpia automates identity and access management operations to help organizations govern user identities and access privileges. It maintains access permissions through the user lifecycle, enforces access request policies, and provides auditing to ensure regulatory compliance. Corpia IGA integrates with ERPs, platforms, and applications to automate provisioning. Key features include access certification, role management, self-service portals, and analytics reporting.

Read more about Corpia

Users also considered
KYDSO logo

Azuring your Identity

learn more
KYDSO seamlessly integrates with Azure environments to optimize identity lifecycle processes such as onboarding, access reviews, and offboarding.

Read more about KYDSO

Users also considered
Netwrix Identity Manager logo

Identity governance & administration (IGA) solution

learn more
Netwrix Usercube is a SaaS-based identity governance and administration (IGA) solution that automates, governs, and controls enterprise identities. It ensures users have the right access to the right things at the right time, enables business owners to grant access without IT assistance. Netwrix Usercube also provides automated attestation campaigns and compliance reports.

Read more about Netwrix Identity Manager

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
SeciossLink logo

Integrated ID management for secure access.

learn more
SeciossLink is an IDaaS that enables integrated ID management, single sign-on (SSO), multi-factor authentication (MFA), access restrictions, and other security measures. It consolidates account information for employees, students, and more to balance convenience and security with SSO and MFA.

Read more about SeciossLink

Users also considered
YeshID Onboard logo

Cloud-based identity management tool for growing companies.

learn more
YeshID Onboard is an identity management tool designed for organizations using Google Workspace. It enables users to streamline onboarding and offboarding processes with templates, task lists, and application provisioning.

Read more about YeshID Onboard

Users also considered
TechIDManager logo

A unique account for every tech on every domain

learn more
TechIDManager is a Privileged Access Management (PAM) tool designed for MSPs to streamline technician account creation, deactivation, permission control, password rotation, and more.

Read more about TechIDManager

Users also considered
TrustLogin logo

Cloud-based SSO and identity management software

learn more
TrustLogin is an IDaaS (Identity as a Service) solution that provides single sign-on (SSO) and centralized management of user identities and passwords for various cloud services, including Google Workspace (formerly G Suite), Microsoft 365 (formerly Office 365), Cybozu, Salesforce, and more.

Read more about TrustLogin

Users also considered
GroupID logo

Group Lifecycle Management Solution

learn more
GroupID is a group and user management software that includes lifecycle and attestation policies to keep information up-to-date and secure.

Read more about GroupID

Users also considered
SecureAuth CIAM logo

Customer identity and access management software

learn more
SecureAuth CIAM enables businesses to deliver frictionless customer experiences while always protecting customer data and brand reputation. SecureAuth's comprehensive CIAM solutions allow organizations to scale without limits, build trust and brand loyalty, secure customer accounts with flexible authentication, and reduce total cost of ownership through intuitive user interfaces and administration.

Read more about SecureAuth CIAM

Users also considered
Melapress Login Security logo

Manage WordPress security with login and password policies

learn more
Melapress Login Security is a comprehensive WordPress plugin that enables website administrators to easily implement robust login and password security policies. This plugin empowers users to comply with these policies by providing real-time feedback and increasing overall website security. Key features include enforcing strong passwords, limiting failed login attempts, changing the WordPress login URL, and device recognition alerts.

Read more about Melapress Login Security

Users also considered
Clarity Security logo

Autonomous ID governance for complex environments

learn more
Clarity Security makes identity governance autonomous, fast, intelligent, and effortless. We automate access reviews, onboarding, and lifecycle management—saving time, reducing risk, and turning IT from a bottleneck into a business enabler.

Read more about Clarity Security

Users also considered
Segura logo

Identity security for privileged access control

learn more
Segura is an identity security platform securing privileged credentials via storage, access segregation, and traceability features.

Read more about Segura

Users also considered
Skillmine Auth logo

Multi-factor authentication and identity management solution

learn more
Skillmine Auth identity management securely controls user identities, authentication, and access across all applications and systems, ensuring only authorized users can access the right resources at the right time similar to leading IAM platforms that centralize identity and access control to simp

Read more about Skillmine Auth

Users also considered
OneIdP logo

Access governance and authentication solution

learn more
UEM-driven Identity and Access Management solution with built-in conditional SSO, endpoint authentication, JIT admin, and seamless user.

Read more about OneIdP

Users also considered
Stytch logo

Identity platform providing APIs and SDKs

learn more
Stytch is an identity platform providing APIs and SDKs to integrate authentication and security into applications. The platform offers enterprise-grade authentication features including passkeys, breach-resistant passwords, and SAML SSO, alongside bot and fraud protection with intelligent rate limiting. Stytch supports both human users and AI agents with turnkey multi-tenancy capabilities and an embeddable admin portal for self-service configuration.

Read more about Stytch

Users also considered
QDesk logo

Empowering Access, Redefining Privilege

learn more
QDesk provides secure, efficient, and compliant end-user access management.

Read more about QDesk

Users also considered
Tecalis Authentication logo

Cloud-based multi-factor authentication solution

learn more
Tecalis Authentication is a cloud-based multi-factor authentication tool that helps businesses with credential management, biometric verification, and compliance regulation.

Read more about Tecalis Authentication

Users also considered
StackBob logo

Identity governance for applications without APIs

learn more
StackBob is an agentic Identity Governance and Administration (IGA) solution that extends governance to applications lacking SCIM, APIs, or connectors. The platform implements alongside existing IGA/IdP systems without replacement or migration, enabling automated joiner-mover-leaver workflows for non-integrated applications.

Read more about StackBob

Users also considered
swIDch PLC-OTAC logo

Dynamic, Passwordless Security for Industrial Control

learn more
PLC-OTAC by swIDch is a single-step multi-factor authentication solution that utilizes dynamic one-time authentication codes to significantly increase security for programmable logic controllers (PLCs) with minimal disruption and computing requirements. This technology neutralizes common PLC vulnerabilities such as default passwords, password sharing, and credential theft, providing a highly secure and streamlined authentication process.

Read more about swIDch PLC-OTAC

Users also considered