Compare the Top Identity Management Software that integrates with Datadog as of October 2025

This a list of Identity Management software that integrates with Datadog. Use the filters on the left to add additional filters for products that have integrations with Datadog. View the products that work with Datadog in the table below.

What is Identity Management Software for Datadog?

Identity management software is a system designed to manage and secure digital identities across an organization. It ensures that users have appropriate access to resources by handling identity creation, maintenance, and deactivation throughout the identity lifecycle. The software includes features such as role-based access control, single sign-on (SSO), and directory services to streamline identity administration. By automating processes like user provisioning and deprovisioning, it enhances efficiency while reducing human errors and security risks. Identity management software is essential for maintaining compliance with regulatory standards and protecting sensitive information from unauthorized access. Compare and read user reviews of the best Identity Management software for Datadog currently available using the table below. This list is updated regularly.

  • 1
    Rippling

    Rippling

    Rippling

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
  • 2
    TrustBuilder

    TrustBuilder

    TrustBuilder

    TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Through our Access Management Platform, TrustBuilder.io, our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. > TrustBuilder's SaaS MFA provides airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 3
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 4
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction with the products they’re supposed to work with. Most importantly, CNAPPs allow businesses to monitor the health of cloud native applications as a whole rather than individually monitoring cloud infrastructure and application security.
  • 5
    Lumos

    Lumos

    Lumos

    Lumos is the internal AppStore for companies. Accelerate access requests, access reviews, and license management through self-service. Cut down on support tickets with automated access requests, approvals, and provisioning. Gain visibility into all your SaaS apps and spend. Remove unused licenses with automated workflows. You're hiring more employees than ever before, and they’re working from everywhere. That means one thing, you’re getting bombarded with help desk tickets asking for access to apps and permissions (and emails asking if you’ve seen their help desk ticket. You have.) Set permissions and approve access for a specific length of time, all within Slack! Before a new hire starts, Lumos will notify their manager and help them set up all apps for their new employee. Not every employee needs access to every app. Avoid headaches by tailoring your AppStore based on employee roles.
  • 6
    Token

    Token

    Token

    Token Security introduces a new approach designed for the Non-Human Identity (NHI) boom era, focusing on machine-first identity security. Identities are everywhere and left unmanaged; they’re machines, apps, services, and workloads created by everyone, popping up all day, every day. The complex and slow process of managing these identities has created an attack surface organizations are simply not prepared to deal with. Instead of focusing on a list of human identities, Token focuses on the resources being accessed first, instantly uncovering who is accessing what, where you are at risk, and how to stay secure. Without interrupting production or business continuity. Token discovers all identities across all locations in your cloud, even breaking down complex mechanisms like Kubernetes, databases, servers, and containers, stitching together all relevant identity data into a single unified view.
  • 7
    Clutch

    Clutch

    Clutch

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies.
  • Previous
  • You're on page 1
  • Next