Alternatives to Core Access Insight

Compare Core Access Insight alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Core Access Insight in 2024. Compare features, ratings, user reviews, pricing, and more from Core Access Insight competitors and alternatives in order to make an informed decision for your business.

  • 1
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 2
    Active Risk Manager (ARM)
    Active Risk Manager, world-leading Project Risk and Enterprise Risk Management software, powering risk management for medium and large organizations in core industries of Aerospace & Defense, Mining, Energy, Rail, Construction, and Government. Highly configurable and flexible to provide a single view of risk. Popular features include: - BowTie; - Quantitative Risk Assessments & Analysis; - Risk Reports & Dashboards, - Risk Normalization & Aggregation, - Incident Management. Popular Benefits Include: - Security Model - Highly Configurable and Scalable - Accelerated Time to Value - Ease of Implementation - Comprehensive Security Control - Full Data History - 24/7 Global Support - On- Premise or Cloud Based Solution
  • 3
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 4
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for organizations and individuals alike.
    Starting Price: €149.00/month
  • 5
    OpenText NetIQ Identity Manager
    Manage the complete identity lifecycle of entities across your diverse, hybrid infrastructure. Deliver efficient, consistent, and secure access to corporate assets within and beyond the firewall. Collect and curate identity information and relationships across complex, hybrid environments. Leverage a centralized framework to provision identities and access to applications and data. Save time and decrease risk by automating tasks required to make access decisions. Continuously adapt security controls based on real-time information and insights. Develop a consistent, overarching view of identities inside and outside your organization. Identity Manager collects and curates identity governance data so you know who has access, why it was granted, and whether it is still needed. With features such as attribute-level authority and continuous reconciliation, you have a single source of truth for identity and access.
  • 6
    Core Security Access Assurance Suite
    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance. Comprised of four industry-leading modules, our identity management software offers the most intelligent and efficient path to mitigating identity risk, and provides a complete solution for streamlining the provisioning process, reviewing access requests, managing compliance, and enforcing robust password management. A convenient web portal where end users can request access and managers can review, approve, or deny access. Using a shopping cart approach, Core Access delivers an efficient and user-friendly experience, replacing paper forms, emails, and tickets used to manage access.
  • 7
    One Identity

    One Identity

    Quest Software

    Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements.
  • 8
    Deep Identity

    Deep Identity

    Deep Identity

    Deep Identity enables you to protect your organization with a complete range of Deep Identity integration and data governance products. Built on light-weight flexible and open architecture. Trusted Identity Audit & Compliance Manager (Trusted IACM) is the industry’s most comprehensive solution that provides a ‘layered approach’ to identity governance and administration. Trusted Identity Manager (Trusted IM) is the industry’s most lightweight solution that provides a “layered” approach to identity administration. Privilege Identity Manager (Trusted PIM) is the industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organization. Data Governance Manager (Trusted DGM) provides complete automation for identity, data access governance and lifecycle management with integration across modules and systems. Handle Full time, Contractors profile management, Access review, N Level approval workflow, Self Service, Bulk provisioning etc
  • 9
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 10
    Ekran System

    Ekran System

    Ekran System

    Protect your assets with our insider risk management platform. Don't let human behavior put your data at risk! Ekran System is a comprehensive insider risk management platform with a rich functionality set. It is designed to monitor, analyze, respond, and prevent cybersecurity risks associated with the activity of legitimate users and privileged accounts. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on the Ekran System! Key solutions and capabilities: - Insider threats management - Privileged Access Management - User activity monitoring - User and entity behavior analytics (UEBA) - Employee activity monitoring - Enhanced Auditing and Reporting
  • 11
    Sequretek Percept IGA
    IGA: Comprehensive Access & Identity Management Through the Lifecycle of Employees. Sequretek Percept IGA is the industry’s leading offering for comprehensive access and identity management of employees through their lifecycle with the organization. The big data platform provides insights and builds context to access decisions within the organization for users accessing assets with all structured and unstructured data. This helps organizations in reducing the risk and helps to improve the policy enforcements. User Access Recertification (UAR) is a compliance need for most of the enterprises. Percept IGA offers UAR by application, department, and organization. This is a completely automated process and can be run either as a scheduled policy or as an ad hoc campaign.
  • 12
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 13
    Xage

    Xage

    Xage Security

    Xage Security is a cybersecurity company that provides zero trust asset protection for critical infrastructure, industrial IoT, and operational technology (OT) environments. Xage's Fabric Platform underpins all of its products and use cases, defending assets against attacks across OT, IIoT, IT, and the cloud. Xage's zero trust approach to security is based on the principle of "never trust, always verify." This means that Xage authenticates all users and devices before granting access to any assets. Xage also enforces granular access policies based on user identity, context, and asset risk. Xage's products include: Zero Trust Remote Access Identity-Based Access Management Zero Trust Data Exchange Xage's products are used by a wide range of organizations, including government agencies, utilities, and industrial manufacturers. Xage's customers rely on Xage to protect their critical infrastructure, OT assets, and industrial data from cyberattacks.
  • 14
    Omada Identity Suite
    Omada is a global market-leading provider of cutting-edge solutions and services for access governance and identity management. Omada's Identity Suite enables organizations to reduce risk exposure, maximize business efficiency, and achieve sustainable compliance. Providing a fully featured process framework for key identity management and access governance functionalities, Omada's Identity Suite helps manage and control user access rights to data and applications and reduces IT costs while streamlining resource-heavy administration processes.
  • 15
    RapidIdentity

    RapidIdentity

    Identity Automation

    Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
  • 16
    Clear Skye IGA

    Clear Skye IGA

    Clear Skye

    Clear Skye IGA is an identity security solution built on the ServiceNow Platform. It provides identity governance through access request, access certification, employee lifecycle automation, and workflow management. With identity data on ServiceNow, Clear Skye plugs directly into your business processes, provides deep identity control and insights, and builds the bridge between the business and IT.
  • 17
    Fischer Identity

    Fischer Identity

    Fischer International Identity

    Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management.
  • 18
    Blockchains

    Blockchains

    Blockchains

    In the physical world, your identity is generally made up of your name and a government-issued ID card that provides the necessary credentials to prove you are who you say you are. A digital identity works the same way – providing the digital world with credentials that prove you are who you say you are – but goes far beyond your name and possible picture. Our digital identity management system allows users to build digital representations of themselves to prove their identity, the things associated with them – important digital documents, property, devices – and access rights to certain services and information. An attestation framework enables a chain of trust in interacting with other users and business or government entities anchored on the blockchain. Our digital identity solutions give control of personal data back to users while delivering the benefits of trusted, distributed identity to consumers and organizations.
  • 19
    Bravura Identity

    Bravura Identity

    Bravura Security

    Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. Users have too many login IDs. A typical user in a large organization may sign into 10 to 20 internal systems. This complexity creates real business problems. Bravura Identity manages the lifecycles of identities, accounts, groups and entitlements. It includes automation to grant and revoke access, after detecting changes on systems of record. A web portal for access requests, profile updates and certification. Full lifecycle management for groups and roles on target systems. A workflow manager to invite people to approve requests, review access or complete tasks. Policy enforcement related to SoD, RBAC, risk scores, privacy protection and more. Reports, dashboards and analytics.
  • 20
    Aembit

    Aembit

    Aembit

    Replace manual and insecure access to non-human identities with our automated and secretless Workload IAM platform. Manage your workload-to-workload access like you do your users: with automated, policy-based and identity-driven controls, so you can proactively eliminate the risk of non-human identities. Aembit boosts security by cryptographically verifying workload identities, in real time, ensuring that only trusted workloads have access to your sensitive data. Aembit injects short-lived credentials into requests just-in-time so you never have to store or protect secrets. Dynamically enforce access rights based on real-time evaluations of workload security posture, geography and other key behavioral characteristics. Aembit secures access amongst workloads in the cloud on-prem and in SaaS.
  • 21
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
  • 22
    Saviynt

    Saviynt

    Saviynt

    Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.
  • 23
    Symantec IGA
    While user experience and instantaneous access to data and services have become the norm, the IT infrastructure that supports these efforts has grown exponentially larger and more complex. In addition, IT organizations are facing ongoing pressures to reduce operational expenses while also maintaining compliance with a growing list of industry and governmental regulations. The end result is an IT organization that must give more people more access to disparate applications in less time, all the while, remaining accountable to a flood of parties governing said access. Today's identity governance and administration technologies must be able to provide broad provisioning support for on-premises and cloud apps, as well as entitlements certification to certify that privileges are appropriate, all while scaling to store millions of user identities.
  • 24
    aapi

    aapi

    aapi

    Act on identity events in other apps to make identity experiences more seamless, secure, compliant, and productive. Automatically embed the correct real-time actions for users and teams to efficiently act on data in downstream apps with a single click. Next-generation granular access into specific functions of apps, surpassing existing PAM and CASB solutions for true zero trust. Events, like identity provisioning and suspicious activity, are responded to by aapi to automate identity, application, and security responses. aapi automatically embeds correct real-time actions for users and teams to act on data in downstream apps within their chosen application with a single click, while access is protected by your IAM. Users are given access to only the individual features within apps they need, while keeping everything else safe and secure, all directly through your IAM.
    Starting Price: $4 per user per month
  • 25
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 26
    CyberArk Workforce Identity
    Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity (formerly Idaptive). Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline management of application access requests, creation of app accounts, and termination of access. Keep workers working, not logging in and out. Make intelligent access decisions based on AI-powered analytics. Enable access across any device, anywhere at just the right time.
  • 27
    OnSolve

    OnSolve

    OnSolve

    Pinpoint and respond to threats that impact your people, places and property – quickly, accurately and reliably. Every minute counts™. That’s why OnSolve prioritizes speed, relevance and usability to help our customers achieve the best possible outcome when a critical event occurs. Communicate faster to the right people on any device. Quickly activate crisis response plans and collaborate in real time. Filter out irrelevant data to make informed, proactive decisions. Deliver customized incident plans and task assignments to ensure appropriate action. Identify all active incidents at-a-glance using the risk intelligence dashboard. Enhance the alert send process to improve response times. Access business continuity plans anywhere via a mobile app.
  • 28
    MobiKEY

    MobiKEY

    Route1

    Generate exceptional outcomes for your organization with real-time secure delivery of actionable intelligence—whether in a manufacturing plant, in-theater, or in a university parking lot. With the right analysis, your performance potential is limitless. We can put the appropriate technology in place to help you find key insights and remove your limitations, all while assuring military-grade data security. Route1 help organizations of all kinds use the data they have—and data they didn’t even know they had—to make better decisions and gain tremendous advantages…with no compromise in data security. Secure data with patented technologies. Understand data with real-time acquisition and analytics. Visualize data with industrial-grade rugged devices. Leverage data with advanced technologies and services. We can help you leverage the data you have and the data you didn’t know you had to make better decisions, gain tremendous advantages and generate exceptional outcomes.
  • 29
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 30
    XYGATE Identity Connector
    Managing strong passwords and credentials is often a challenge. Ensuring they are stored properly, changed regularly, meet complexity and compliance requirements, and are auditable can be overwhelming to implement and manage. Current solutions for requesting and managing user access are outdated and inefficient. Processes are manual, complex, and don’t map to the core business initiatives driving change within the enterprise. Governance is often an afterthought, leaving many enterprises vulnerable to increased security risks and potential non-compliance with external regulations or internal corporate mandates. Visibility and control of NonStop user data directly from SailPoint IdentityIQ. Quickly detect risks and entitlement issues. Automate the provisioning process. Address account compliance concerns. SailPoint certified integration. CyberArk certified integration. Integrated with XYGATE Suite.
  • 31
    OpenIAM

    OpenIAM

    OpenIAM

    Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user.
  • 32
    BAAR-IGA

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications.
  • 33
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.
    Starting Price: $595.00 / year
  • 34
    midPoint

    midPoint

    Evolveum

    Go with the best. Join hundreds of organizations that have tried and trust midPoint, the open-source leader in Identity Governance and Administration. Choose what fits you: run midPoint in the cloud, the hybrid cloud or on-premise. Accelerate your security and efficiency with enhanced visibility, policing, synchronization, and identity management. Meet the requirements of the regulations with midPoint’s excellent accountability, record-keeping abilities, and data protection scope. Put users in control of their personal data managed by organizations through the implementation of advanced data protection and privacy mechanisms. Enhance the digital experience of the users by empowering them to enable self-service access requests, password resets, and profile management. Enjoy the scalability and comfort midPoint in the cloud brings. Save valuable time and human resources by engaging third-party experts to take care of the seamless operation. Get the most out of the synergy.
  • 35
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 36
    HORACIUS IAM
    The agility of business processes directly depends on the management of access rights to systems, and choosing a platform for IAM Identity Management that guarantees the security of all access, applications and data is one of the most important strategic decisions that will reduce costs and risks, increasing the productivity of the entire company. After all, how do you ensure that all users in your organization have only the appropriate levels of access, applications, data and transactions? In addition, the IAM Identity Management platform can be integrated with the main Human Resources systems, synchronizing information and performing tasks vital to the smooth running of the business. The entire history of people's rights to the systems is managed, from the first access, at the time of admission, until the revocation of rights at the end of the link.
  • 37
    Corsha

    Corsha

    Corsha

    APIs power all of your applications and services. Secrets are shared. They are rarely rotated, sometimes never at all. API keys and tokens, even PKI, are getting leaked at an alarming rate. You need clear visibility into and simple control over the machines that are accessing your APIs. Organizations lack visibility into the machines that are leveraging API secrets, and as automation shifts risk from human to machine, the identities of these machines and the secrets they use is more important than ever. Corsha stops API attacks that use stolen or compromised API credentials and helps enterprises protect data and applications that leverage machine to machine (or service to service) API communication.
  • 38
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 39
    HID SAFE

    HID SAFE

    HID Global

    Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations.
  • 40
    CloudCodes

    CloudCodes

    CloudCodes

    CloudCodes is a cloud security solution provider founded in 2011. We focus on providing cloud security solutions to enterprise customers through its single sign-on solution. Our objective is to provide a simple, effective, and efficient platform for securing cloud applications for an enterprise. CloudCodes offers integrated solutions and efficient control over your data. We are also recognized by analyst firm Gartner as one of the sample vendors for Cloud Security and SaaS Security. CloudCodes supports and endorses data governance to enterprises on any device. Our cloud security applications namely G suite, Office 365, Slack, Jira, and many others will ensure the protection of sensitive business data, prevent online attacks, and take necessary actions against cyber threats and data loss. Allowing control over access to data and formulate efficient governance policies for the user. Access Control can regulate and monitor permissions to business data by formulating policies.
    Starting Price: $8.00/year/user
  • 41
    Google Cloud Identity
    A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
    Starting Price: $6 per user per month
  • 42
    Stack Identity

    Stack Identity

    Stack Identity

    We identify, eliminate and govern shadow access - unauthorized, unmonitored and invisible access to cloud data, applications and infrastructure before an attacker can exploit it. We transform cloud IAM operations with an automated and risk-driven approach to securing and governing cloud data. This empowers cloud and security teams to quickly identify every data access pattern; who, what, when, where and why there is data access and its impact on cloud data security. Stack Identity protects cloud data by prioritizing both the risk and impact of identity, access and data vulnerabilities, visualized via our live data attack map. We help you remediate all types of access risks – human and API-based, guiding identity practitioners, governance and compliance teams and data owners to take definitive action and provide SecOps and DevOps teams with an honest view of cloud security risks.
  • 43
    Oracle Identity Management
    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service.
  • 44
    Nomidio

    Nomidio

    Nomidio

    The world's most advanced unified Identity and Authentication Service. At Nomidio we specialise in protecting identities. Using our federated identity cloud, we liberate companies from holding unnecessary PII and enable secure customer identification for loan applications, verification of customers to access account information and much more. It all starts with the Nomidio Identity Cloud, which is an incredibly secure, quantum-ready, identity vault. The ID cloud delivers multiple identity services to multiple organizations, removing the need and expensive risk to companies of propagating identity data as is the standard today. The identity data is secured using our parent company’s patented Quorum multiparty split key cryptography, meaning that anyone wanting to decrypt any one record will require the compliance of other holders of the key fragments. Nomidio IDC is a light touch, highly effective biometric identity and authorization tool, 100% SaaS and can be deployed in minutes.
    Starting Price: $3.88 per user per month
  • 45
    Tessian Human Layer Risk Hub
    Tessian’s Human Layer Risk Hub enables security and risk management leaders to deeply understand their organization’s email security posture by providing granular visibility and reporting into individual user risk levels and drivers. Human error is one of the major causes of data breaches. But, to combat human error and distribute budget and resources effectively, Security and Risk Management leaders first need to understand and report the key areas of risk. What kinds of threats are the highest risk in your organization? What people are most at-risk or likely to make a mistake? Where and how can you improve your security stack and improve safer email behavior? Tessian analyzes a broad range of signals from historical and real-time email data, uses identity data from MS directory for contextual insights, and builds a Behavior Intelligence Model (BIM) – a complete picture of each individual risk profile across five key risk drivers and generates a risk score.
  • 46
    StaffCop

    StaffCop

    Atom Security

    StaffCop provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity. Collect Collect all activity events at the end points for subsequent analysis, notifications and decision making. Analyze Automatic and statistical analysis of data to detect anomalies of user behavior, identify incidents, insiders and disloyal employees. Alert Automatic alerts about violations of security policies, dangerous and unproductive activities of employees. Report Pre-configured & self-made reports width periodic e-mail sending. You can easily create reports with a powerful constructor. Block Blocking access to "negative" sites, running applications and removable USB-storages to reduces the risk of malware infection and increase employee productivity. Review Search for all data for keywords and regular expressions, easy correlation & drilldown
    Starting Price: $69.00/one-time/user
  • 47
    Microsoft Identity Manager
    Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors.
  • 48
    Clear Analytics

    Clear Analytics

    Clear Analytics

    Integrate directly with your current Excel environment. No migration or training. Create custom dashboards and queries in minutes. Self Service Analytics allows access to data without waiting on IT. IT maintains governance, monitors data utilization behavior, and infrastructure security, allowing focus on improving data quality and delivery. Clear Analytics aggregates data from a variety of sources, then leverages Microsoft’s Power BI features to enable you to wrangle, filter, model, and visualize your insights. Clear Analytics can also publish datasets directly to the Power BI portal. Continue using Excel, but with the added benefit of accessing accurate data on-demand. No more delays searching your email for versions. Elevate all user's productivity by giving them the tools to be their own data analysts and collaborate freely. Increase productivity by granting departments easy yet secure access to company data. Departments don’t wait on analysts. Analysts focus on high-impact work.
    Starting Price: $39.99 one-time payment
  • 49
    MobileID.io

    MobileID.io

    ARIADNEXT

    Digital identity is defined as the identity of an entity on the web. It is the technological link between a real entity (a person, a company, an organization) and virtual entities, i.e. its digital representations. The digital identity thus allows the identification of an individual online, as well as his or her connection to services offered on the web. Gone are the lists of identifiers and passwords to remember to authenticate oneself online, from now on digital identity makes it possible to prove that the user is indeed the person he or she claims to be and thus to identify oneself to online services in a secure manner. These digital identities enable governments, public services, private companies and regulated activities (banks, Fintech, online games, etc.) to protect themselves against the risks of fraud and to comply with increasingly restrictive regulations while remaining accessible to the greatest number of people.
  • 50
    ForgeRock

    ForgeRock

    ForgeRock

    Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs.