getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Identity Management Software - Page 9

Last updated: March 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

254 software options

swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
IDHub logo

Right Access, for Right People, to Right Systems

learn more
IDHub - fully customizable, on-prem or cloud IAM solution, no-code, GUI, drag-drop functionality, for IT & managers, to control user access & rights.

Easy to learn, simple to use.
Fail fast, succeed faster.
Implement changes/updates in hours, not months.
Straightforward, per-user pricing structure.

Read more about IDHub

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Manage privileged access to identities and protect them from compromise. Consolidate identities and manage granular access provisions.

Read more about Securden

Users also considered
Appsian Security Platform logo

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered
Evidian logo

Identity and access management platform

learn more
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities.

Read more about Evidian

Users also considered
Prove ID logo

All-Suite ID Verification & Management Platform

learn more
Prove ID is an all suite KYC platform for businesses to build trust online in a legally compliant way. It allows any two or more parties to verify ID, willingness and eligibility for accessing services.

Read more about Prove ID

Users also considered
Akku (Cloud Access Security Broker) logo

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
Build38 logo

>The Next Generation mobile app security platform_

learn more
Build38 offers the future of mobile app security: a single, integrated platform with cloud-augmented AI and three layers of protection. We secure your apps and backend from all threats, freeing developers to innovate. Build with confidence.

Read more about Build38

Users also considered
Cognito logo

No-code identity verification solution

learn more
Cognito Flow lets you verify the identity of your customers, wherever they are, in any way you need, with 20 lines of code. With documentary, data source, and liveness verifications, you can stay compliant with KYC/AML rules and improve trust and safety without sacrificing conversion rates.

Read more about Cognito

Users also considered
IBM Security zSecure logo

A suite of tools for security assurance and task automation

learn more
IBM Security zSecure is a suite of user authorization and compliance automation products designed to add new levels of security to a mainframe. It supports IBM Z hardware, software, virtualization, and standard enterprise security managers (ESMs). With audits, alerts, reporting, and authentication tools, this solution can enhance security while detecting internal and external threats.

Read more about IBM Security zSecure

Users also considered
Cloud Identity logo

Multi biometric platform in the cloud (SaaS)

learn more
Multi biometric platform in the cloud, to reliably validate the identity of people, by capturing biographical and biometric data.

Read more about Cloud Identity

Users also considered
PropelAuth logo

Authentication software

learn more
PropelAuth is a B2B authorization software that helps businesses sell to companies of any size immediately with just a few lines of code.

Read more about PropelAuth

Users also considered
OLOID logo

Cloud-based identity management software

learn more
OLOID, a cloud-based SaaS platform to manage workplace identity and access with a mobile-first approach, presents OLOID M-Tag. OLOID M-Tag is the world’s first self-installable retrofit mobile access solution to upgrade your existing access control systems.

Read more about OLOID

Users also considered
Keystash logo

Level up your cloud IT security

learn more
Keystash is an integrated IAM and SSH Key management solution to manage users, groups, SSH Keys and SSH server security across your Linux environments.

Read more about Keystash

Users also considered
VeriFinger SDK logo

VeriFinger SDK is a solution for fingerprint identification

learn more
The VeriFinger algorithm is based on deep neural networks and follows the commonly accepted fingerprint identification scheme. It uses a set of specific fingerprint points (minutiae) along with a number of proprietary algorithmic solutions that enhance system performance and reliability.

Read more about VeriFinger SDK

Users also considered
SafeNet Trusted Access logo

Secure access to all apps with authentication everywhere

learn more
With SafeNet Trusted Access, simplify user access to enterprise apps & cloud services, eliminate password headaches for IT & users, & automate cloud identity management. In addition, view all access events, ensuring the correct person has access to the right application at the right level of trust.

Read more about SafeNet Trusted Access

Users also considered
Daito logo

Web-based authenticator for TOTP

learn more
Easily manage 2FA for shared accounts with a web-based TOTP authenticator.

Read more about Daito

Users also considered
Privileged Account Manager logo

Access Governance redefined for Hybrid environments

learn more
Consolidate and manage access to machine and human identities throughout your organization. Provide granular access to data and applications for all the identities and manage privileged identity access centrally. Get an overview of all the identities in your network with the holistic dashboard view.

Read more about Privileged Account Manager

Users also considered
Kycaid logo

KYC&AML compliance solution for businesses

learn more
Kycaid is a one-stop-shop compliance platform with a mission to help businesses to stay compliant with regulations through AML&KYC solutions and more. Kycaid employs a holistic approach to verifying your clients' identity, from the document and biometric check to AML screening and KYB verification.

Read more about Kycaid

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
Regula logo

Fast and Reliable Document Verification

learn more
A fully automatic system for reading and authenticating passports, ID cards, driver's licenses, and visas.

Read more about Regula

Users also considered
ReachFive logo

SaaS CIAM: Secure identity, Access, and Omnichannel CX

learn more
ReachFive's Customer Identity Management manages the full lifecycle: flexible registration, unified profiles (omnichannel, self-service), secure auth (MFA, passwordless), and data sync via APIs. It embeds security and GDPR compliance, building trust and enabling personalized journeys.

Read more about ReachFive

Users also considered
TrustLogin logo

Cloud-based SSO and identity management software

learn more
TrustLogin is an IDaaS (Identity as a Service) solution that provides single sign-on (SSO) and centralized management of user identities and passwords for various cloud services, including Google Workspace (formerly G Suite), Microsoft 365 (formerly Office 365), Cybozu, Salesforce, and more.

Read more about TrustLogin

Users also considered
ToothPic Key Protection SDK logo

Cloud-based authentication and identity management solution

learn more
ToothPic Key Protection SDK is a cloud-based authentication tool that helps businesses verify signatures, encrypt documents, and exchange cryptocurrency data on a unified platform.

Read more about ToothPic Key Protection SDK

Users also considered