getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Identity Management Software with Mid size business - Page 4

Last updated: May 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


223 software options

PingFederate logo

Identity management, single sign-on (SSO), and API security

learn more
With Ping Identity, you don’t need application passwords — or the problems they create, such as administrative headaches, help desk overload or security risks. Our Internet Identity Security solutions allow users to securely access Web-based business applications without multiple logins.

Read more about PingFederate

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
CoreOne Suite logo

IT management solution for medium to large businesses

learn more
CoreOne Suite is a cloud-based and on-premise IT management solution which helps medium to large businesses manage identity, access, operations, and single sign-on. The platform enables users to automate employee entries, withdrawals, transgressions and mutations with role-based authorizations.

Read more about CoreOne Suite

Users also considered
QuickLaunch SSO logo

Identity, access & password management software

learn more
QuickLaunch is a cloud-based Identity as a Service (IDaaS) platform offering Single Sign-On (SSO), multi-factor authentication (MFA), password management & more

Read more about QuickLaunch SSO

Users also considered
LogonBox logo

Password and identity management software

learn more
LogonBox is a password and identity management software that helps businesses track password history, manage remote resets, handle self-service unlock, and more from within a unified platform. It enables staff members to automatically receive password expiration and system enrollment reminder notifications.

Read more about LogonBox

Users also considered
Apache Syncope logo

Open-source identity management software

learn more
Apache Syncope is an open-source solution based on Java EE technology, which helps businesses of all sizes manage digital identities and access management operations. The platform allows organizations to manage user data across applications and systems.

Read more about Apache Syncope

Users also considered
BAAR-IGA logo

Automated Identity Governance and Administration

learn more
BAAR-IGA is an identity governance and administration tool that helps administer and manage who should have access, who has current access, and how the access is being used.

Read more about BAAR-IGA

Users also considered
NIM logo

NexGen Identity Management and User Provisioning

learn more
NIM is an on-premise solution that provides enterprise-level user provisioning for organizations with large complex data sets. With NIM's unique multi-source and target data aggregation features, data from multiple systems can be viewed and utilized for provisioning, rostering, and basic exports.

Read more about NIM

Users also considered
Onboarding 3.0 logo

Identity verification & facial biometrics platform for LATAM

learn more
Onboarding 3.0 is an identity verification solution for end-to-end financial product onboarding in LATAM. With biometric and ID capture/OCR capabilities, this solution is designed to validate and authenticate customers while streamlining sales processes for teams.

Read more about Onboarding 3.0

Users also considered
Gataca logo

The platform to interact with digital identity wallets.

learn more
Gataca is a digital identity platform. Regulated organizations are forced to choose between strong security and user experience. Gataca solves this by combining ID Wallets with with a real-time identity intelligence layer that enables high-assurance verification in just one click.

Read more about Gataca

Users also considered
Regula logo

Fast and Reliable Document Verification

learn more
A fully automatic system for reading and authenticating passports, ID cards, driver's licenses, and visas.

Read more about Regula

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Veza logo

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
Soffid IAM logo

The Future of IAM is here and it's converged

learn more
Soffid IAM is a Converged IAM Platform that brings Access Management (AM), Identity Governance (IGA) and Privileged Account Management (PAM) in one comprehensive platform. Soffid enables fast and accurate user provisioning, role-based access management, reporting and analytics.

Read more about Soffid IAM

Users also considered
RightCrowd Access Analytics logo

Automate your user access reviews!

learn more
Tired of difficult user access reviews? Ditch the manual spreadsheets and automate your user access reviews with RightCrowd Access Analytics.

With an automatic review process, your teams can spend less time on manual review tasks and demonstrate compliance more quickly.

Read more about RightCrowd Access Analytics

Users also considered
TeleSign Platform logo

Global ID verification & communication APIs

learn more
Telesign provides global verification and communications APIs to help businesses authenticate users and prevent fraud. The platform offers phone number intelligence, SMS and voice verification, and messaging via WhatsApp, Viber, and RCS. Telesign's digital identity solutions build customer trust and protect against synthetic identity fraud, account takeovers, and other threats across countries.

Read more about TeleSign Platform

Users also considered
Venafi Trust Protection Platform logo

Cloud-based cybersecurity platform

learn more
Venafi is a cloud-based cybersecurity platform that helps in identity management and securing machine-to-machine connections and communications.

Read more about Venafi Trust Protection Platform

Users also considered
Omada Identity logo

Do more with identity

learn more
Omada offers a full-featured Identity Governance & Administration (IGA) as a service solution that enables organizations to achieve compliance, reduce risk, and maximize efficiency. Omada delivers innovative identity management, helps customers deploy within 12 weeks, and scale with confidence.

Read more about Omada Identity

Users also considered
SecureONE logo

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping's high-performance directory can be deployed anywhere, is designed for scale and flexibility, and can support regulatory compliance. No matter if you perform a one-time data migration or utilize real-time, bidirectional data syncing, you can create a single source of truth for all users.

Read more about Ping Identity

Users also considered
Specops Password Policy logo

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered
PixelPin logo

Identity management and authentication software

learn more
PixelPin is a cloud-based cyber security solution designed to help businesses manage passwords using pictures to ensure safe authentication against mass phishing attacks. It lets teams use their own pictures to provide secure login into various applications and websites.

Read more about PixelPin

Users also considered
YOUZER logo

IT and SaaS account management & monitoring

learn more
Youzer is an online software that helps companies to manage the IT accounts and assets of their employees

Read more about YOUZER

Users also considered
Veriff logo

AI-verification platform with verification specialist

learn more
Veriff is an online identity verification company that protects businesses and their customers from online identity fraud. With the help of artificial intelligence, Veriff analyzes thousands of technological and behavioral variables in seconds, verifying people from 230+ countries and territories in

Read more about Veriff

Users also considered
Zilla Security logo

Cloud security and threat detection platform

learn more
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered