App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Identity Management Software - Page 6

243 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Imprivata Privileged Access Management logo
5.0
(2)

Cloud-based privileged access management software

learn more
Xton Access Manager is a cloud-based privileged access management software that helps businesses handle and secure privileged accounts, credentials, and certificates on a centralized platform. Supervisors can configure access permissions and store passwords, keys, or critical documents in an identity vault.

Read more about Imprivata Privileged Access Management

Users also considered
AU10TIX logo
5.0
(2)

Identity and document verification management software

learn more
AU10TIX helps businesses in financial services, telecommunication, marketplaces, and other verticals streamline identity authentication operations. The platform lets users automate customer data verification processes, ensure compliance with statutory regulation, and avoid fraudulent activities.

Read more about AU10TIX

Users also considered
Trust Swiftly logo
5.0
(2)

Identity verification software to adaptively prevent fraud

learn more
Trust Swiftly orchestrates identity verifications with advanced checks to identify fraud. Verify identities with an adaptive approach that improves compliance while simplifying onboarding workflows.

Read more about Trust Swiftly

Users also considered
ValidEntry logo
5.0
(2)

Free Web3.0 Identity Verification

learn more
ValidEntry enables businesses creating in Web3.0 to transform their customer identification process with AI-driven automated identity solutions.

Read more about ValidEntry

Users also considered
Oz Liveness logo
5.0
(2)

Facial recognition tool for mitigating biometric fraud

learn more
Oz Liveness is a facial recognition tool, which helps organizations mitigate the risk of biometric fraud by preventing deepfake and spoofing attacks using advanced algorithms

Read more about Oz Liveness

Users also considered
CoSync Auth logo
5.0
(2)

Customer identity and access management software

learn more
CoSync Auth is an authentication solution that helps developers create applications using MongoDB Realm to streamline user management. Key features include multi-factor authentication, user identity, custom metadata, custom email templates, custom authentication flows, language localization, and more.

Read more about CoSync Auth

Users also considered
SmartSignin logo
5.0
(2)

The Smart, Simple & Secure Identity for the Cloud

learn more
SmartSignin provides enterprises of all sizes a secure means of managing identity and access to confidential cloud data. An intuitive interface makes it possible to control employee, customer and partner access to cloud applications from a single dashboard and across multiple devices.

Read more about SmartSignin

Users also considered
MIRACL Trust logo
4.5
(2)

2 second deviceless MFA on any platform or browser.

learn more
MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) that has been shown to increase customer traffic by up to 15%. Log into any mobile, desktop or even a smart TV, in 2 seconds with a success rate of up to 99.96%.

Read more about MIRACL Trust

Users also considered
NorthRow  logo
4.5
(2)

Compliance management solution

learn more
NorthRow provides software which empowers compliance officers to make faster decisions and onboard customers in seconds, not days whilst complying with ever-changing legislation, so that they can contribute to their business’ growth, safely.

Read more about NorthRow

Users also considered
App Volumes logo
5.0
(1)

Application portfolio for virtual environments

learn more
VMware App Volumes is a portfolio of applications and user management solutions for Horizon, Citrix Virtual Apps and Desktops, and RDSH.

Read more about App Volumes

Users also considered
Sima logo
5.0
(1)

Multi-Factor, Cloud-Based Access Control Solution

learn more
Active Witness is a cloud-based Access Control solution that simplifies your facility security.

Its integrated hardware and Access Control software leverages mobile credentials and facial biometrics for highly secure and affordable facility access, made simple with easy-to-use cloud-based software.

Read more about Sima

Users also considered
Atlassian Access logo
5.0
(1)

Atlassian cloud data security & governance

learn more
Atlassian Access is an enterprise-grade security solution providing centralized administration across all Atlassian cloud products, designed to help protect company data and ensure compliance.

Read more about Atlassian Access

Users also considered
Sonrai Public Cloud Security Platform logo
5.0
(1)

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
Kinde logo
5.0
(1)

Simple, powerful authentication that integrates in minutes.

learn more
Kinde is a cloud-based software infrastructure provider for modern applications. Its offering spans authentication, user management, release management, and billing, all in one place and easily implemented for any tech stack.

Read more about Kinde

Users also considered
QuickLaunch SSO logo
5.0
(1)

Identity, access & password management software

learn more
QuickLaunch is a cloud-based Identity as a Service (IDaaS) platform offering Single Sign-On (SSO), multi-factor authentication (MFA), password management & more

Read more about QuickLaunch SSO

Users also considered
LogonBox logo
5.0
(1)

Password and identity management software

learn more
LogonBox is a password and identity management software that helps businesses track password history, manage remote resets, handle self-service unlock, and more from within a unified platform. It enables staff members to automatically receive password expiration and system enrollment reminder notifications.

Read more about LogonBox

Users also considered
NIM logo
5.0
(1)

NexGen Identity Management and User Provisioning

learn more
NIM is an on-premise solution that provides enterprise-level user provisioning for organizations with large complex data sets. With NIM's unique multi-source and target data aggregation features, data from multiple systems can be viewed and utilized for provisioning, rostering, and basic exports.

Read more about NIM

Users also considered
TeleSign Platform logo
5.0
(1)

Integrity your customers will trust

learn more
TeleSign is a customer identity and engagement solution that helps businesses to register accounts, verify phone numbers, identify users, prevent fraud, streamline customer engagement and more.

Read more about TeleSign Platform

Users also considered
Venafi Trust Protection Platform logo
5.0
(1)

Cloud-based cybersecurity platform

learn more
Venafi is a cloud-based cybersecurity platform that helps in identity management and securing machine-to-machine connections and communications.

Read more about Venafi Trust Protection Platform

Users also considered
RightCrowd Access Analytics logo
5.0
(1)

Automate your user access reviews!

learn more
Tired of difficult user access reviews? Ditch the manual spreadsheets and automate your user access reviews with RightCrowd Access Analytics.

With an automatic review process, your teams can spend less time on manual review tasks and demonstrate compliance more quickly.

Read more about RightCrowd Access Analytics

Users also considered
AccessOwl logo
5.0
(1)

Cloud-based access management and governance software

learn more
AccessOwl is an identity governance and access management platform that automates user provisioning and de-provisioning. It provides a live view of user accounts and permissions across SaaS applications. AccessOwl enables access requests, approval workflows, and access reviews to strengthen compliance. The software integrates with HRIS systems for automated onboarding and offboarding.

Read more about AccessOwl

Users also considered
Gataca logo
5.0
(1)

Issue, verify, and manage identity credentials.

learn more

Gataca Studio streamlines identity credentials issuance, verification, and management from one simple dashboard. Gataca Wallet securely stores tamper-proof identity credentials, allowing passwordless and privacy-preserving access to online services.

Read more about Gataca

Users also considered
Apache Syncope logo
5.0
(1)

Open-source identity management software

learn more
Apache Syncope is an open-source solution based on Java EE technology, which helps businesses of all sizes manage digital identities and access management operations. The platform allows organizations to manage user data across applications and systems.

Read more about Apache Syncope

Users also considered
Alice Biometrics logo
5.0
(1)

Identity verification solution

learn more
Alice Biometrics offers swift remote identity verification for businesses, enabling client onboarding in seconds via secure, AI-driven checks. Developed over a decade, Alice provides instant verification with sub-1 second responses, without manual reviews. It integrates facial recognition, liveness detection, ID reading, document validation, and AML database checks, aiding sectors like finance, mobility, hospitality, telecoms, and gaming to verify users and comply with regulations.

Read more about Alice Biometrics

Users also considered
Veza logo
5.0
(1)

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered