getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Identity Management Software with Non profits - Page 9

Last updated: May 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


223 software options

Systancia Identity logo

Identity governance and administration software

learn more
Systancia Identity is an identity governance and administration product (IGA). It provides a repository of workforce identities and manages their authorizations, ensuring perfect consistency between your HR and production IS.

Read more about Systancia Identity

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
SafeNet Trusted Access logo

Secure access to all apps with authentication everywhere

learn more
With SafeNet Trusted Access, simplify user access to enterprise apps & cloud services, eliminate password headaches for IT & users, & automate cloud identity management. In addition, view all access events, ensuring the correct person has access to the right application at the right level of trust.

Read more about SafeNet Trusted Access

Users also considered
Clarity Security logo

Autonomous ID governance for complex environments

learn more
Clarity Security makes identity governance autonomous, fast, intelligent, and effortless. We automate access reviews, onboarding, and lifecycle management—saving time, reducing risk, and turning IT from a bottleneck into a business enabler.

Read more about Clarity Security

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Manage privileged access to identities and protect them from compromise. Consolidate identities and manage granular access provisions.

Read more about Securden

Users also considered
Pyla logo

On/offboarding platform for IT teams

learn more
Pyla is a on/offboarding IT platform for SMBs and Mid-caps. It simplifies the management of hardware and software when onboarding, transfer or offboarding employees and partners.

Read more about Pyla

Users also considered
Akku (Cloud Access Security Broker) logo

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
QDesk logo

Empowering Access, Redefining Privilege

learn more
QDesk provides secure, efficient, and compliant end-user access management.

Read more about QDesk

Users also considered
IdRamp  logo

Cloud-based identity and access management solution

learn more
IdRamp is a cloud-based identity and access management solution designed to help businesses manage identity verification & credential certification through decentralized information sharing. The platform enables users to protect user & administrator passwords and ensure regulatory compliance.

Read more about IdRamp

Users also considered
IGA Toolkit logo

Identity governance and administration solution

learn more
IGA Toolkit is a web-based identity management software designed to help businesses streamline security administration and user identity processes across the organization. The solution facilitates automated testing of several security controls, such as access pattern analysis and user termination.

Read more about IGA Toolkit

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
Cognito logo

No-code identity verification solution

learn more
Cognito Flow lets you verify the identity of your customers, wherever they are, in any way you need, with 20 lines of code. With documentary, data source, and liveness verifications, you can stay compliant with KYC/AML rules and improve trust and safety without sacrificing conversion rates.

Read more about Cognito

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered
Jira Oauth logo

Enable Secure Login to Jira Cloud through mO Jira OAuth

learn more
The Jira OAuth solution makes it easy for users to log in to Jira with their OAuth 2.0 credentials and OpenID Connect credentials.

Integrate your custom OAuth Provider with Atlassian Access to ensure seamless SSO.

Read more about Jira Oauth

Users also considered
Melapress Login Security logo

Manage WordPress security with login and password policies

learn more
Melapress Login Security is a comprehensive WordPress plugin that enables website administrators to easily implement robust login and password security policies. This plugin empowers users to comply with these policies by providing real-time feedback and increasing overall website security. Key features include enforcing strong passwords, limiting failed login attempts, changing the WordPress login URL, and device recognition alerts.

Read more about Melapress Login Security

Users also considered
VeriFinger SDK logo

VeriFinger SDK is a solution for fingerprint identification

learn more
The VeriFinger algorithm is based on deep neural networks and follows the commonly accepted fingerprint identification scheme. It uses a set of specific fingerprint points (minutiae) along with a number of proprietary algorithmic solutions that enhance system performance and reliability.

Read more about VeriFinger SDK

Users also considered
SecureAuth CIAM logo

Customer identity and access management software

learn more
SecureAuth CIAM enables businesses to deliver frictionless customer experiences while always protecting customer data and brand reputation. SecureAuth's comprehensive CIAM solutions allow organizations to scale without limits, build trust and brand loyalty, secure customer accounts with flexible authentication, and reduce total cost of ownership through intuitive user interfaces and administration.

Read more about SecureAuth CIAM

Users also considered
CloudEagle logo

A unified platform for SaaS security, identity governance.

learn more
CloudEagle.ai is an AI-powered SaaS Management, Identity Governance, and Security platform that gives enterprises a unified command center to discover, govern, secure, and optimize their entire SaaS and AI ecosystem.
Modern IT and security teams face a compounding problem: SaaS sprawl, shadow AI ado

Read more about CloudEagle

Users also considered
Enzoic for Active Directory logo

Tool to stop breached passwords & credentials automatically

learn more
Enzoic for Active Directory is a software that helps automate password security, block weak and exposed credentials in real time, enforce NIST compliance, and protect the organization without user disruption.

Read more about Enzoic for Active Directory

Users also considered
PasskeyBridge logo

Identity threat detection and response platform

learn more
PasskeyBridge is an identity threat response platform that ingests carrier signals, credentials, and biometric data to detect and neutralize security threats in real time. It executes automated playbooks to respond to incidents like SIM swaps, credential breaches, and unauthorized access. PasskeyBridge features FIDO2 passkey authentication, verifiable credentials with post-quantum cryptography, and insider threat analytics without storing personally identifiable information.

Read more about PasskeyBridge

Users also considered
TechIDManager logo

A unique account for every tech on every domain

learn more
TechIDManager is a Privileged Access Management (PAM) tool designed for MSPs to streamline technician account creation, deactivation, permission control, password rotation, and more.

Read more about TechIDManager

Users also considered
Appsian Security Platform logo

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered