App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Identity Management Software - Page 7

229 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Uniqkey logo

Uniqkey

5.0
(1)

Best Password Manager for Business

learn more
Uniqkey is a European-based password and access management solution tailored for businesses. Engineered with IT professionals in mind and designed for an effortless user experience, our platform streamlines password management while offering centralized access control for administrators.

Read more about Uniqkey

Users also considered
RapidIdentity logo

RapidIdentity

3.5
(2)

Identity and access management software for K-12 institutes

learn more
RapidIdentity is an identity management software that helps K-12 educational institutes manage provisioning, create user groups, configure roles, and more on a centralized platform. It enables administrators to set up single sign-on (SSO) and multi-factor authentication (MFA) to provide students with access to on-premise and cloud-based applications.

Read more about RapidIdentity

Users also considered
Signicat logo

Signicat

4.0
(1)

Identity proofing, authentication and electronic signing.

learn more
Signicat, for access management of online services, functions as a link between various identity providers and online services. The online service provider chooses which login methods can be offered to the customer and Signicat takes care of the connection with the relevant identity providers.

Read more about Signicat

Users also considered
Defend logo

Defend

4.0
(1)

Full-day, real-time identity—without extra hardware.

learn more
Plurilock DEFEND, an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real-time, as regular work is carried out, without otherwise inconveniencing or interrupting users.

Read more about Defend

Users also considered
The OptimalCloud logo

The OptimalCloud

4.0
(1)

Cloud-based identity and access management software

learn more
The OptimalCloud helps organizations manage and provide secure access to various applications using single sign-on (SSO) capability. Users can submit registration requests, reset passwords, delegate administrative tasks to members across teams, and approve workflows via a unified portal.

Read more about The OptimalCloud

Users also considered
Symantec IGA logo

Symantec IGA

4.0
(1)

Identity and governance management platform

learn more
Symantec IGA is an identity management platform that helps businesses configure access permissions to applications, systems, and data according to requirements.

Read more about Symantec IGA

Users also considered
Zeotap logo

Zeotap

(0)

Customer Data Unleashed

learn more
Zeotap unifies all your 1P identifiers including anonymized PII and login data across multiple channels and devices for more effective digital advertising. Extend your graph with Zeotap’s for higher match rates and append additional IDs that can be transacted in the ecosystem.

Read more about Zeotap

Users also considered
SSI Kit logo

SSI Kit

(0)

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about SSI Kit

Users also considered
Akku (Cloud Access Security Broker) logo

Akku (Cloud Access Security Broker)

(0)

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
BlueX eID Management logo

BlueX eID Management

(0)

Software for the management of eIDs

learn more
BlueX eID Management is a software package that manages soft certificates and hard certificates, such as smart cards and other electronic identifications (eIDs). The system is based on configurable workflows and automates every part of the eID management process.

Read more about BlueX eID Management

Users also considered
HID PKI-as-a-Service logo

HID PKI-as-a-Service

(0)

Cloud-based, Managed PKI-as-a-Service (PKIaaS)

learn more
HID PKIaaS helps organizations create & deploy private PKI trust hierarchies to secure IT systems and IoT devices. Automate and scale certificate provisioning for every system and device with the HID Account Certificate Manager (ACM).

Read more about HID PKI-as-a-Service

Users also considered
Interset logo

Interset

(0)

Cybersecurity and threat intelligence software

learn more
Interset is a cybersecurity and analytics platform that uses machine learning and AI to detect and respond to insider and external threats in real time. It is designed to help organizations identify and respond to security threats before they cause damage.

Interset is used by organizations in a variety of industries, including healthcare, financial services, and government. It can help organizations comply with regulatory requirements and protect sensitive data from cyber threats.

Read more about Interset

Users also considered
Verosint logo

Verosint

(0)

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
Identify logo

Identify

(0)

A digital solution for access and identity management

learn more
IDENTIFY is an access and identity management system that automates document validation and customer authentication in registration processes, using dynamic forms and advanced technologies, such as facial biometrics, optical character recognition, and FaceMatch. Available in Portuguese.

Read more about Identify

Users also considered
The Credivera Exchange logo

The Credivera Exchange

(0)

Cloud-based digital identity management solution

learn more
The Credivera Exchange is a cloud-based digital identity management solution that allows businesses in the IT industry to handle credential verification processes, perform audits, and manage projects from a unified platform.

Read more about The Credivera Exchange

Users also considered
OLOID logo

OLOID

(0)

Tesla-like mobile key experience for the modern workplace

learn more
OLOID, a cloud-based SaaS platform to manage workplace identity and access with a mobile-first approach, presents OLOID M-Tag. OLOID M-Tag is the world’s first self-installable retrofit mobile access solution to upgrade your existing access control systems.

Read more about OLOID

Users also considered
Regula logo

Regula

(0)

Fast and Reliable Document Verification

learn more
A fully automatic system for reading and authenticating passports, ID cards, driver's licenses, and visas.

Read more about Regula

Users also considered
Kinde logo

Kinde

5.0
(1)

Simple, powerful authentication that integrates in minutes.

learn more
Kinde is a cloud-based software infrastructure provider for modern applications. Its offering spans authentication, user management, release management, and billing, all in one place and easily implemented for any tech stack.

Read more about Kinde

Users also considered
Profile Pass logo

Profile Pass

(0)

Construction software that reduces administrative pressure

learn more
Profile Pass is a SaaS solution for the construction sector. The aim is to reduce (traditional) administrative actions through Profile Cards and associated software. The Profile Card serves as a construction ID and provides up-to-date information for clients and contractors.

Read more about Profile Pass

Users also considered
LiveEnsure logo

LiveEnsure

(0)

Four factor user authentication

learn more
Live Ensure protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks.

Read more about LiveEnsure

Users also considered
M365 Manager Plus logo

M365 Manager Plus

(0)

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
YIM logo

YIM

(0)

Control Your Access

learn more
YIM is an access & identity solution that enables organisations to digitalise their access management processes: the solution for contractor and visitor management. Our features: visitor, employee and contractor registration, e-learning, badge printing, reporting and audit trail.

Read more about YIM

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK

(0)

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Efecte Identity, Governance and Administration logo

Efecte Identity, Governance and Administration

(0)

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte Identity, Governance and Administration

Users also considered