Alternatives to Tools4ever IAM

Compare Tools4ever IAM alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Tools4ever IAM in 2024. Compare features, ratings, user reviews, pricing, and more from Tools4ever IAM competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. Tools4ever IAM View Software
    Visit Website
  • 2
    Cisco Duo

    Cisco Duo

    Cisco

    Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
    Leader badge
    Compare vs. Tools4ever IAM View Software
    Visit Website
  • 3
    ManageEngine ADManager Plus
    ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. Create multiple users and groups in Office 365, manage licenses, create Exchange mailboxes, migrate mailboxes, set storage limits, add proxy addresses, and more.
    Compare vs. Tools4ever IAM View Software
    Visit Website
  • 4
    Uniqkey

    Uniqkey

    Uniqkey

    Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Recognized as the easiest tool to use, Uniqkey removes friction from employees’ daily workflows by automating time-consuming authentication and security tasks, thereby increasing productivity. Its intuitive and user-friendly interface makes Uniqkey the perfect choice for employees. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence.
    Compare vs. Tools4ever IAM View Software
    Visit Website
  • 5
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 6
    The OptimalCloud

    The OptimalCloud

    Optimal IdM

    The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. Each feature-rich pricing tier comes with multi-factor authentication (MFA), because proper security shouldn't cost extra. The OptimalCloud is integrated with more than eleven thousand applications, simplifying set up and configuration and also has 24 x 7 x 365 support with a guaranteed uptime of 99.99%.
    Starting Price: $2/user/month
  • 7
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. Trusted by over 250 global customers, Zluri is committed to delivering innovative, reliable, and scalable solutions that empower organizations to optimize their SaaS usage, ensure compliance, and enhance Access Management practices.
  • 8
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 9
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 10
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 11
    Youzer

    Youzer

    YOUZER

    The unique user repository informs you of the arrivals and departures of employees, temporary workers, service providers, etc. in real time. You can launch account creation/suspension actions with packages that you have set up. Youzer connects to all your applications to analyse and supervise all access accounts. Regularly check the alignment of each employee's authorisations. Everyone has access to what they need: no more, no less. Regular analysis of orphaned accounts, inconsistent authorisations, specific access rights, sensitive security groups, etc. A sales person, a technician, a consultant... The accounts to be created are different depending on the profile of the user who arrives. The resource packages allow you to create the right accounts for the right users.
  • 12
    Access Auditor

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning. Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls. SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week.
  • 13
    Netwrix GroupID
    The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector.
  • 14
    BAAR-IGA

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications.
  • 15
    Oracle Identity Management
    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service.
  • 16
    RapidScale Identity as a Service
    RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you.
  • 17
    Symantec IGA

    Symantec IGA

    Broadcom

    While user experience and instantaneous access to data and services have become the norm, the IT infrastructure that supports these efforts has grown exponentially larger and more complex. In addition, IT organizations are facing ongoing pressures to reduce operational expenses while also maintaining compliance with a growing list of industry and governmental regulations. The end result is an IT organization that must give more people more access to disparate applications in less time, all the while, remaining accountable to a flood of parties governing said access. Today's identity governance and administration technologies must be able to provide broad provisioning support for on-premises and cloud apps, as well as entitlements certification to certify that privileges are appropriate, all while scaling to store millions of user identities.
  • 18
    Sysgem Enterprise Manager
    Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM. SEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework. Unite, simplify and integrate core system administration solutions across a multi-platform environment. Unify user account management across a multi-platform, multi-application environment. Manage the controlled distribution and deployment of configuration files across infrastructure.
    Starting Price: $200 per user per month
  • 19
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 20
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired by a company, entered an organization or just created a new Google account? Companies, organizations and cloud entities work with applications that need your data to function properly, username, password, e-mail, first name, surname, and more. In brief, Identity Management takes care of managing identity data throughout what is called the Identity Lifecycle.
  • 21
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.
  • 22
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    PeoplePlatform allows you to automate and delegate all the common tasks associated with Identity Management. Stop spending time on provisioning, deprovisioning and directory updates, instead empower your organization to handle these tasks through a simple web interface. Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned.
  • 23
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 24
    Jamf Connect
    In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.
    Starting Price: $2 per user per month
  • 25
    Garancy IAM Suite

    Garancy IAM Suite

    Beta Systems Software

    The best-fit identity management solution for dynamic companies. What makes identity management particularly challenging today is the increasing dynamic nature of business operations across the board. The IT landscape is subject to ongoing changes and growth in terms of IT systems and applications. New legal provisions and intensive audits have a major impact on compliance-related concerns. Both users and user types change constantly. Today’s business is characterized by frequent restructuring, acquisitions and international operations – and these dynamics require companies to run highly flexible organizations that can keep stride with all this change. In addition, business pressures call for solutions that support digital transformation and Industry 4.0. Beta Systems identity and access management solutions bring maximum flexibility to dynamic companies. Fully covers all compliance requirements by integrating governance and provisioning in a single IAM system.
  • 26
    IAMCompare

    IAMCompare

    IAMCompare

    IAMCompare is the only solution focused on auditing the integrity of your Provisioning & De-provisioning process. We perpetually identify user access exceptions and track to resolution, reducing both time and cost from your process. IAMCompare is a focused solution that brings companies direct visibility into their account. Our solution provides results at a transparent price point. Next, our clients identify assets (applications, databases, devices, other) that require monitoring and supply relevant account data. IAMCompare unites census and account information and identifies actionable anomalies. View account access for employees as well as authorized contractors, vendors & customers. Leverage IAMCompare to streamline system user access reviews and standardize vendor, customer and other 3rd party user certifications.
    Starting Price: $500 per month
  • 27
    Fischer Identity

    Fischer Identity

    Fischer International Identity

    Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management.
  • 28
    Akku

    Akku

    CloudNow Technologies

    The corporate user lifecycle, streamlined. Akku is a robust, flexible identity and access management solution created to help you manage every stage of the user lifecycle more effectively. With its range of versatile features, Akku helps improve data security, standards compliance, efficiency and productivity. Akku delivers a powerful cloud SSO solution that can be integrated easily with almost any cloud or in-house application, and packages a range of security and access control features that make user provisioning, management, access control and deprovisioning seamless. Unlike many other IAM solutions, Akku is built on an agentless architecture, without the need for a user agent to be installed on your infrastructure. So you know exactly what parts of your sensitive user information Akku can access, ensuring transparency and control.
    Starting Price: $5.00/year/user
  • 29
    OpenText NetIQ Identity Manager
    Manage the complete identity lifecycle of entities across your diverse, hybrid infrastructure. Deliver efficient, consistent, and secure access to corporate assets within and beyond the firewall. Collect and curate identity information and relationships across complex, hybrid environments. Leverage a centralized framework to provision identities and access to applications and data. Save time and decrease risk by automating tasks required to make access decisions. Continuously adapt security controls based on real-time information and insights. Develop a consistent, overarching view of identities inside and outside your organization. Identity Manager collects and curates identity governance data so you know who has access, why it was granted, and whether it is still needed. With features such as attribute-level authority and continuous reconciliation, you have a single source of truth for identity and access.
  • 30
    CzechIDM

    CzechIDM

    BCV solutions

    IT department is typically snowed under with routine requests having to do with account management: manual account creation, password resetting, auditing work, long-inactive accounts. Often, there is no accounting for who has got access and where. We help our customers to automate their routine processes, centralize information systems, delegate account management to business owners, and keep transparent evidence of granted permissions. Identity Management (IdM) is all about centralizing identity and access management within IT systems. It enables the right persons to gain access to the right kind of data sources, at the right time, for the right reasons, and most importantly, with reliable evidencing records on hand. We help companies to improve Identity and Access Management. Our aim is to make companies safer and more efficient by simplifying user management across companies’ systems.
  • 31
    IBM Security Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 32
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 33
    CyberArk Workforce Identity
    Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity (formerly Idaptive). Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline management of application access requests, creation of app accounts, and termination of access. Keep workers working, not logging in and out. Make intelligent access decisions based on AI-powered analytics. Enable access across any device, anywhere at just the right time.
  • 34
    Vault One

    Vault One

    VaultOne Software

    Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4
    Starting Price: $99 per month
  • 35
    MonoSign

    MonoSign

    MonoFor

    MonoSign is a comprehensive Identity & Access Management solution for enterprise level companies. Get Universal Directory, Single Sign-On, Adaptive MFA, Lifecycle Management and many more. MonoFor is standing today with MonoSign — one of the most powerful and quick-to-deploy Identity & Access Management software for enterprise level companies.
    Starting Price: $4/month/user
  • 36
    CoffeeBean Identity and Access Management
    CoffeeBean Identity and Access Management is a comprehensive solution in the areas of IAM (Identity and Access Management) and CIAM (Customer Identity and Access Management). The different modules of this platform include Single Sign-On (SSO), Multi-Factor Authentication (MFA or 2FA), Adaptive Authentication, Directory Services, Lifecycle Management. Ask, capture and safely store information about the user’s consent during their registration process. Manage terms of the service lifecycle, prompting the user to accept new terms when necessary. Track all changes for consents, permissions and terms of service. This feature helps your business comply with regulations such as GDPR. Set up forms to gradually capture data from users in different moments of their journey (on first contact, after the nth login, coupon redeeming). With this technique, you avoid overwhelming customers with long forms during their registration process but still get the chance to progressively build their profile.
  • 37
    LoginTC

    LoginTC

    Cyphercor

    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
    Starting Price: $3/month/user
  • 38
    ManageEngine M365 Manager Plus
    M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.
    Starting Price: $345 per year
  • 39
    Core Security Access Assurance Suite
    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance. Comprised of four industry-leading modules, our identity management software offers the most intelligent and efficient path to mitigating identity risk, and provides a complete solution for streamlining the provisioning process, reviewing access requests, managing compliance, and enforcing robust password management. A convenient web portal where end users can request access and managers can review, approve, or deny access. Using a shopping cart approach, Core Access delivers an efficient and user-friendly experience, replacing paper forms, emails, and tickets used to manage access.
  • 40
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 41
    HORACIUS IAM

    HORACIUS IAM

    e-trust

    The agility of business processes directly depends on the management of access rights to systems, and choosing a platform for IAM Identity Management that guarantees the security of all access, applications and data is one of the most important strategic decisions that will reduce costs and risks, increasing the productivity of the entire company. After all, how do you ensure that all users in your organization have only the appropriate levels of access, applications, data and transactions? In addition, the IAM Identity Management platform can be integrated with the main Human Resources systems, synchronizing information and performing tasks vital to the smooth running of the business. The entire history of people's rights to the systems is managed, from the first access, at the time of admission, until the revocation of rights at the end of the link.
  • 42
    Arnica UnifiedLogon

    Arnica UnifiedLogon

    Arnica Software

    Arnica UnifiedLogon is an identity management system, which provides access control, personalization and configuration services, and allows you to implement single-point user log-on for access to multiple applications. It is a powerful tool for efficient control of granular user access to applications, application resources and functionalities, all managed through a web browser. Arnica UnifiedLogon was designed as an extremely scalable system, and is perfectly suited for management of any number of users - from a dozen of local users at a small organization to thousands of users in a large enterprise, to millions of users at a public web site. Arnica UnifiedLogon provides several ways of maintaining and extending user profile data to a virtually unlimited level of complexity.
  • 43
    Evidian

    Evidian

    Eviden

    In today's digital world, each of us expect the same convenience at work that we experience at home. Evidian IDaaS lets your users authenticate once to transparently access all entitled web resources. While their satisfaction has increased, you also improve overall security level: every suppressed (avoided) password is one less attack vector. Evidian IDaaS integrates your on-premise and on the cloud applications to your Transparent SSO.
  • 44
    RapidIdentity

    RapidIdentity

    Identity Automation

    Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
  • 45
    One Identity

    One Identity

    Quest Software

    Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements.
  • 46
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 47
    Bravura Identity

    Bravura Identity

    Bravura Security

    Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. Users have too many login IDs. A typical user in a large organization may sign into 10 to 20 internal systems. This complexity creates real business problems. Bravura Identity manages the lifecycles of identities, accounts, groups and entitlements. It includes automation to grant and revoke access, after detecting changes on systems of record. A web portal for access requests, profile updates and certification. Full lifecycle management for groups and roles on target systems. A workflow manager to invite people to approve requests, review access or complete tasks. Policy enforcement related to SoD, RBAC, risk scores, privacy protection and more. Reports, dashboards and analytics.
  • 48
    PlainID

    PlainID

    PlainID

    PlainID is The Authorization Company. PlainID provides both Business AND Admin teams with a simple and intuitive means to control their organization’s entire authorization process, all based on your own business logic. The platform allows you to implement literally any kind of rules you could imagine, all without coding, and all in fine grained detail. PlainID simplifies Authorization so that thousands of Roles, Attributes and even Environmental Factors can be converted into a few logical SmartAuthorization policies using our Graph Database Decision Engine. In-depth Analytics and Insights: PlainID provides unobstructed visibility with a full audit trail. Compliance, regulation and audit requirements, they’re easy to manage on a simple graph-based UI. Access is determined dynamically and in real time, based on user attributes, environmental attributes (time, location, etc.) as well as event based authorizations. PlainID combines ABAC & RABC to a united policy.
  • 49
    HelloID

    HelloID

    Tools4ever

    HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of IDM into your hands to meet current and future needs. HelloID Modules: Provisioning - Automate the entire user lifecycle process by connecting your HR or SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. Service Automation - Transform your legacy help desk into a fully automated “Self-Service” platform Access Management - Zero-Trust security with 1-click Single Sign-On (SSO) and Multifactor Authentication (MFA)
    Starting Price: 2.18/month/user
  • 50
    Adaxes

    Adaxes

    Softerra

    Adaxes is a management and automation solution that provides enhanced administration experience to Active Directory, Exchange and Microsoft 365 environments. Adaxes features a rule-based platform for Active Directory, Exchange and Microsoft 365 automation, provides an enhanced web-based management environment, gives you a role-based access control model for delegating privileges, adds security with approval-based workflow, allows enforcing corporate data standards and much more. With Adaxes all user lifecycle management procedures can be fully automated, including provisioning, re-provisioning and deprovisioning in Active Directory and connected systems, such as Exchange, Microsoft 365 and Skype for Business. Adaxes Web Interface allows managing Active Directory from any device via a standard web browser. It provides a clean and intuitive UI for admins, help desk and other staff to execute their AD administration tasks and a self-service portal for regular users.
    Starting Price: $1,600 one-time payment