getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Identity Management Software with Compliance management - Page 2

Last updated: May 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


181 software options

Acre Security logo

Enterprise visitor management for your workplace.

learn more
Welcome visitors to your workplace with our enterprise visitor management system, which provides a digital visitor registration, check-in and check-out streamlined process for you and your visitors.

Our system is live in over 3000 sites around the world with over 30 million annual users globally.

Read more about Acre Security

Users also considered
Under logo

Under.io

learn more
Under: No-code platform streamlining onboarding. Build custom forms with e-signatures, and fully mapped PDFs, conduct KYC/KYB checks, and get more customers, faster.

Read more about Under

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Integrity Advocate logo

ID Verification and Online Proctoring Solution

learn more
Integrity Advocate is web-based software for online proctoring, identity verification, and participation monitoring. It works on all tablets, Chromebooks, laptops, desktops, and mobile devices.

Read more about Integrity Advocate

Users also considered
Corma logo

The simplest license & access governance platform

learn more
Corma is the simplest license & access governance platform for modern IT teams.

Read more about Corma

Users also considered
FastPass IVM logo

Identity Verification Solution for help desks - add-on ITSM

learn more
FastPass Identity Verification Manager (IVM) secures the IT service desk with role-based, context-aware workforce identity verification. Integrated with ITSM tools like ServiceNow, it replaces common sense checks with structured, policy-driven workflows that stop social engineering attacks.

Read more about FastPass IVM

Users also considered
AppViewX AVX ONE CLM logo

AppViewX CERT+ Simplifies Certificate Lifecycle Management

learn more
AppViewX AVX ONE CLM is a ready-to-consume, scalable, and efficient certificate lifecycle management (CLM) solution to effectively automate and manage machine and non human identities as an integral part of your cybersecurity strategy.

Read more about AppViewX AVX ONE CLM

Users also considered
Trust Swiftly logo

Identity verification software to adaptively prevent fraud

learn more
Trust Swiftly orchestrates identity verifications with advanced checks to identify fraud. Verify identities with an adaptive approach that improves compliance while simplifying onboarding workflows.

Read more about Trust Swiftly

Users also considered
ReACT logo

Self-service password reset and synchronization software

learn more
ReACT is a cloud-based self-service password reset and synchronization software designed to help businesses establish an automated access management process, enabling users to reset passwords using self-guided steps. The platform enables organizations to streamline identification, authentication, system selection, and password creation activities using a unified portal.

Read more about ReACT

Users also considered
Entrust Identity as a Service logo

Identity & access management solution

learn more
Entrust IDaaS is a cloud-based IAM solution designed to help organizations of all sizes deploy multi-factor authentication for accessing networks, devices, and applications. Key features include single sign-on, IAM, virtual smart cards, workflow automation, user group and identity management.

Read more about Entrust Identity as a Service

Users also considered
Frontegg logo

User Management for the PLG Era

learn more
Frontegg is a user management platform, designed for the Product-Led Growth (PLG) era. Frontegg provides blazing-fast integration of a powerful user infrastructure, designed to handle modern application use-cases.

Read more about Frontegg

Users also considered
VaultOne logo

Digital security platform for password & identity management

learn more
VaultOne is an identity and access management software designed to help businesses secure users' credentials and control access permissions to infrastructures, websites, servers, databases, and applications from a centralized platform.

Read more about VaultOne

Users also considered
UserLock logo

Multi-Factor Authentication and Access Management

learn more
UserLock simplifies identity management for on-prem-based Active Directory environments. By adding MFA, SSO, and contextual access controls, UserLock allows IT to protect access to network and SaaS resources, without duplicating identities or adding third-party cloud dependencies.

Read more about UserLock

Users also considered
VISULOX logo

Privileged access management solution

learn more
Leading privileged access management solution with an integrated remote support platform for secure external access. VISULOX is the answer to who did what, where, and when in your IT Infrastructure.

VISULOX is easy to integrate and rapidly improves the security cloud, hybrid, or on-prem deployments

Read more about VISULOX

Users also considered
Scrive logo

Electronic signature & verification management solution

learn more
Scrive is a cloud-based identification management solution designed to help businesses manage processes related to electronic signature capture and identity verification relating to forms or contracts. The platform enables organizations to share, sign, and manage documents using mobile devices.

Read more about Scrive

Users also considered
JiJi Self Service Password Reset logo

Self-service password reset and identity management software

learn more
JiJi Self Service Password Reset is designed to help employees securely reset the passwords for their Active Directory accounts using guided steps and a self-service portal. It enables professionals to unblock accounts, change passwords, update personal information, and reset cached domain passwords via a unified platform.

Read more about JiJi Self Service Password Reset

Users also considered
Doordesk logo

Visitor management software with QR codes

learn more
DoorDesk is a visitor management system that helps businesses handle the safety and security of premises. It assists with visitor registration, check-in, and tracking. Visitors can quickly check in by scanning a QR code, which can be sent to them via email or SMS.

Read more about Doordesk

Users also considered
AU10TIX logo

Identity and document verification management software

learn more
AU10TIX helps businesses in financial services, telecommunication, marketplaces, and other verticals streamline identity authentication operations. The platform lets users automate customer data verification processes, ensure compliance with statutory regulation, and avoid fraudulent activities.

Read more about AU10TIX

Users also considered
System Frontier logo

Customer identity and access management software

learn more
System Frontier helps businesses in the healthcare, transportation, utilities, finance, and other sectors manage user access across servers, workstations and the cloud. Administrators can control and gain visibility into actions, tasks, and changes executed in a sandbox environment.

Read more about System Frontier

Users also considered
FAD logo

Cloud-based digital signature and authentication software

learn more
FAD is a cloud-based software designed to help businesses collect, validate, and record electronic signatures in compliance with industry regulations. Managers can capture videos of remote clients during agreement signing processes, enabling them to authenticate and verify the identity of end-users.

Read more about FAD

Users also considered
Authfy logo

CIAM; IAM; Passwordless; MFA; Identity; Authentication

learn more
Protects the journey of employees, third parties and vendors through frictionless single sign on capabilities, secure remote access, enabling MFA against credential theft and cyberattacks, unifying the entire authentication, authorization, risk assessment and fraud prevention, zero trust.

Read more about Authfy

Users also considered
Incode Omni logo

Automated. Modular. Customizable, no-code orchestration.

learn more
Global organizations choose Incode for IDV, AML, KYC, KYB, and Age Verification. Incode's suite of end-to-end, AI-powered identity solutions revolutionizes onboarding and intelligence with modular, no-code orchestration and source-of-truth connections. Drive conversions and revenue at Incode.com

Read more about Incode Omni

Users also considered
Imprivata OneSign logo

Single Sign-On (SSO) solution for healthcare organizations

learn more
Imprivata OneSign is a single sign-on (SSO) and authentication solution designed to help healthcare organizations ensure secured access to clinical and administrative applications deployed across cloud or on-premise environments.

Read more about Imprivata OneSign

Users also considered
Imprivata Privileged Access Management logo

Cloud-based privileged access management software

learn more
Xton Access Manager is a cloud-based privileged access management software that helps businesses handle and secure privileged accounts, credentials, and certificates on a centralized platform. Supervisors can configure access permissions and store passwords, keys, or critical documents in an identity vault.

Read more about Imprivata Privileged Access Management

Users also considered
Tenable Cloud Security logo

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Tenable Cloud Security

Users also considered