getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Access Governance Software - Page 4

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


98 software options

External User Manager logo

Security & compliance with guest users in Microsoft Teams

learn more
With External User Manager, keep control of guest users in Microsoft Teams with a request & approval workflow, mandatory onboarding to sign required agreements or rules, and a lifecycle process to regularly check if access is still required.

Read more about External User Manager

Users also considered
Appsian Security Platform logo

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
Privacera logo

Cloud data access governance and compliance platform

learn more
Privacera is the cloud-based platform that helps businesses streamline data security governance processes.

Read more about Privacera

Users also considered
Faronics WINSelect logo

Cloud-based user access and cyber security management tool

learn more
Faronics WINSelect helps organizations configure Windows computers to prevent unauthorized usage and ensure that their staff can only perform necessary functions with them. Key features include user experience management, secure workstations, standard user environments, and intervention management.

Read more about Faronics WINSelect

Users also considered
TrustLogin logo

Cloud-based SSO and identity management software

learn more
TrustLogin is an IDaaS (Identity as a Service) solution that provides single sign-on (SSO) and centralized management of user identities and passwords for various cloud services, including Google Workspace (formerly G Suite), Microsoft 365 (formerly Office 365), Cybozu, Salesforce, and more.

Read more about TrustLogin

Users also considered
Freedom Cloud ACaaS logo

Cloud-based access control software

learn more
Freedom Cloud is a cloud-based access control software, designed to help organizations across government, aviation, education, healthcare and several other sectors control, monitor, manage and maintain physical access control systems (PACS).

Read more about Freedom Cloud ACaaS

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
CloudEagle logo

A unified platform for SaaS security, identity governance.

learn more
CloudEagle.ai gives IT, Security, and Finance teams a single command center to manage every SaaS and AI application in their environment, from discovery and governance to cost optimization and compliance.

Read more about CloudEagle

Users also considered
UnityIS logo

Access control and governance in the cloud

learn more
Powerful cloud solution for all security management needs.

Read more about UnityIS

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Enforce Zero Trust in your organization by providing Just-in-Time access to privileged data and credentials to users based on their roles. Elevate applications on a need basis, and revoke administrative access. Grant remote access to devices and applications without revealing login credentials.

Read more about Securden Unified PAM

Users also considered
Daito logo

Web-based authenticator for TOTP

learn more
Easily manage 2FA for shared accounts with a web-based TOTP authenticator.

Read more about Daito

Users also considered
YESOD logo

SaaS management platform to integrate business operations

learn more
YESOD is a cloud-based SaaS management platform for integrating various business operations scattered in different departments and branches, allowing users to customize various features relevant to their company. Additionally, the platform allows users to personalize information delivery to ensure only authorized people have access. The platform is designed for Japanese companies with multiple departments.

Read more about YESOD

Users also considered
IDHub logo

Right Access, for Right People, to Right Systems

learn more
IDHub - fully customizable, on-prem or cloud IAM solution, no-code, GUI, drag-drop functionality, for IT & managers, to control user access & rights.

Easy to learn, simple to use.
Fail fast, succeed faster.
Implement changes/updates in hours, not months.
Straightforward, per-user pricing structure.

Read more about IDHub

Users also considered
Systancia Identity logo

Identity governance and administration software

learn more
Systancia Identity is an identity governance and administration product (IGA). It provides a repository of workforce identities and manages their authorizations, ensuring perfect consistency between your HR and production IS.

Read more about Systancia Identity

Users also considered
Scalefusion OneIdP logo

Access governance and authentication solution

learn more
Enable secure and seamless Single Sign-On (SSO) with conditional access policies, device trust validation, and integration with external directories.

Read more about Scalefusion OneIdP

Users also considered
Efecte IGA logo

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte IGA

Users also considered
Luchismart logo

Cloud-based access control and time tracking solution

learn more
Harnessing the power of the cloud, Luchismart offers a range of state-of-the-art access control solutions that leverage advanced encryption and authentication mechanisms to ensure the highest level of security.

Read more about Luchismart

Users also considered
SafeNet Trusted Access logo

Secure access to all apps with authentication everywhere

learn more
SafeNet Trusted Access provides flexible access management, giving customers real-time control over the capacity to enforce policies at the individual user, group, or application level. The policy engine allows leverage of existing investments to secure cloud & web-based applications.

Read more about SafeNet Trusted Access

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

Better govern access to sensitive unstructured data, implement least privilege, and demonstrate compliance with the Lepide Data Security Platform.


Read more about Lepide Data Security Platform

Users also considered
Evidian logo

Identity and access management platform

learn more
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities.

Read more about Evidian

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden delivers advanced Access Governance to unify control over identities, access, and privileges across hybrid IT. Gain real-time visibility, enforce least-privilege policies, automate approvals, and meet compliance with integrated auditing and monitoring.

Read more about Securden

Users also considered