Find and Compare

Best Identity and Access Management Software

Compare and evaluate Identity and Access Management Software vendors using the most in-depth and unbiased analyst reports available. Download free comprehensive 40+ page reports to select the best Identity and Access Management Software software for your organization.

data quadrant report

Data Quadrant Report

Quickly evaluate top vendors using our comprehensive market report. Compare product features, vendor strengths, user-satisfaction and more.

emotional footprint report

Emotional Footprint Report

Don't settle for just any vendor – find the one you can trust. Use the Emotional Footprint report to see which vendors treat their customers right.

Powered by Info-Tech Research Group
Powered by Info-Tech Research Group

What is Identity and Access Management Software?

Identity Access Management (IAM) is a software-based framework of policies and technologies for ensuring that an organization has the appropriate access to technology resources. Identity and access management systems identify, authenticate and authorize individuals who access IT resources.

Top Identity and Access Management Software Awards

Next Award: June 2021

Latest Award Icon
Identity and Access Management Emotional Footprint Awards

Write a review to help crown the next winner in Identity and Access Management, then follow us on LinkedIn to get notified about the results. For every approved review you will receive some compensation for your time and effort.

Latest Award: December 2020

Latest Award Icon

See the most recent winners of our SoftwareReviews Data Quadrant Awards. View our Gold Medalists and compare top vendors using our free downloadable reports.

Latest Research

5
Aug

Author: Scott Bickley (Info-Tech)

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

Compare Identity and Access Management Software

Filter by:

Data QuadrantReport

A thorough evaluation and ranking of all software to compare software across every dimension.

Data Quadrant Report report

Emotional FootprintReport

A detailed and unique report that captures a powerful indicator of overall user feeling toward the vendor and product.

Emotional Footprint Report report
Badge Winner
Badge Winner

Symantec

Symantec Identity Security

Balance digital trust and great user experiences—in any environment, on any device, and through any application.

8.3

Composite Score

8.5

CX Score

+84

Emotional Footprint

83%

Likeliness to Recommend

23

Reviews

Badge Winner
Badge Winner

Microsoft

Microsoft Identity Manager

Synchronize identities between directories, databases and applications. Enable self-service password, group and certificate management. Increase admin security and thwart identity theft with policies, privileged access and roles.

7.7

Composite Score

7.8

CX Score

+76

Emotional Footprint

81%

Likeliness to Recommend

57

Reviews

Badge Winner
Badge Winner

HID Global Corporation

HID DigitalPersona

The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages an array of easily deployable authentication methods so users can quickly and easily gain access to their cloud applications, such as Microsoft 365, VPNs, corporate networks, Windows desktops, Citrix applications and more. Crossmatch was acquired by HID Global in September 2018.

7.7

Composite Score

7.7

CX Score

+75

Emotional Footprint

81%

Likeliness to Recommend

49

Reviews

IBM

IBM Security Identity Manager

IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.

7.3

Composite Score

7.3

CX Score

+70

Emotional Footprint

73%

Likeliness to Recommend

26

Reviews

SAP

SAP Identity and Access Management

Safeguard your company's information assets with identity and access management and security compliance. Manage business continuity and minimize cost and risk with an approach to identity and access management that drives security compliance.

7.3

Composite Score

7.4

CX Score

+70

Emotional Footprint

72%

Likeliness to Recommend

43

Reviews

RSA

RSA Via

RSA Via is a set of SaaS and software solutions that work together to protect the entire identity and access lifecycle. It features a governance-driven approach to ensure consistency in access controls, regardless of the user’s location, device or where the resources reside. RSA Via ensures continuous compliance with changing rules and regulations without rendering current IAM investments obsolete.

7.2

Composite Score

7.2

CX Score

+70

Emotional Footprint

74%

Likeliness to Recommend

43

Reviews

Okta, Inc

Okta Identity Cloud

Okta's products manage identity and access for millions of people on millions of devices. We offer products in two lines: IT Products and Platform.

7.2

Composite Score

6.8

CX Score

+62

Emotional Footprint

77%

Likeliness to Recommend

16

Reviews

Oracle

Oracle Identity and Access Management

Oracle’s complete, integrated next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs. Achieve rapid compliance with regulatory mandates. Secure sensitive applications and data—regardless of whether they are hosted on premises or in the cloud.

7.0

Composite Score

6.9

CX Score

+62

Emotional Footprint

74%

Likeliness to Recommend

23

Reviews

SailPoint Technologies Holdings, Inc.

SailPoint IdentityIQ

With IdentityIQ at the center of your enterprise, you can control access to every file and application across your hybrid IT environment by employees, partners, contractors — even bots.

9.4

Composite Score

9.7

CX Score

+97

Emotional Footprint

93%

Likeliness to Recommend

7

Reviews

Radiant Logic

RadiantOne FID

RadiantOne’s full-spectrum identity service is the only IdM solution purpose-built to scale alongside your business, integrating with your evolving infrastructure.

9.0

Composite Score

--

CX Score

+98

Emotional Footprint

96%

Likeliness to Recommend

5

Reviews

BeyondTrust Corporation

Bomgar Privileged Access Management

Bomgar’s Privileged Access Management (PAM) solution enables organizations to control and manage privileged access to critical data and systems, while empowering users to be more productive. The solution consists of two components - Bomgar Privileged Identity and Bomgar Privileged Access. With Bomgar's integrated PAM solution you can protect privileged accounts and assets at the speed and scale of your business.

8.5

Composite Score

8.5

CX Score

+86

Emotional Footprint

95%

Likeliness to Recommend

7

Reviews

Broadcom Inc.

CA Identity Suite

The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. Read more at http://www.ca.com/us/products/ca-identity-suite.html

8.0

Composite Score

8.2

CX Score

+80

Emotional Footprint

79%

Likeliness to Recommend

8

Reviews

Courion Corporation

Courion Suite

Courion provides a comprehensive suite of identity management and access governance solutions that help organizations minimize risk, streamline operations and reduce costs.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Hitachi ID Systems

Hitachi ID Identity and Access Management Suite

The Hitachi ID Identity and Access Management Suite is designed as identity management and access governance middleware, in the sense that it presents a uniform user interface and a consolidated set of business processes to manage user objects, identity attributes, security rights and credentials across multiple systems and platforms.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Micro Focus

Micro Focus Identity and Access Management

We believe identity powers everything. Our identity-centric approach to security reduces risk, improves user experience, drives innovation and increases business value. With our identity platform, organizations can integrate modern IAM policies and best practices across local, mobile and cloud environments. We provide organizations with the ability to integrate identity data (user, device, thing or service) to manage the identity lifecycle and control access. Our platform provides identity governance, access management, and privileged account management.

--

Composite Score

6.9

CX Score

+62

Emotional Footprint

89%

Likeliness to Recommend

1

Reviews

Dell Technologies

Dell One Identity Manager

With Dell One Identity Manager you can unify security policies, meet compliance needs and achieve governance while improving business agility today and in the future with a modular and scalable Identity and Access Management solution.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Avatier

Avatier Identity Anywhere

The Avatier Identity Management Products improve business performance. Our business-focused identity management platform enables IT password, provisioning, and governance operations through workflow automation and self-service. Our products reduce information security complexity, while providing a single system of record for compliance reporting.

--

Composite Score

7.2

CX Score

+88

Emotional Footprint

67%

Likeliness to Recommend

1

Reviews

ForgeRock

ForgeRock Identity Platform

We secure digital identities for people, devices, and connected things online. We verify who you are and what you can access.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Identity Automation

RapidIdentity

Securely streamline all identity and access management with advanced, user-friendly RapidIdentity software from Identity Automation.

--

Composite Score

8.0

CX Score

+84

Emotional Footprint

85%

Likeliness to Recommend

3

Reviews

Okera Inc

Omada Identity

Omada Identity Suite is a technology leading enterprise solution for integrated identity and access management, governance and compliance. Omada Identity Suite provides a dynamic and adaptable yet fully integrated enterprise platform for both identity management and identity governance.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Fischer International

Fischer Identity

Fischer Identity simplifies, accelerates, and automates the complex task of managing identities for on- and off-premise resources with no limits to scalability or reach, and ensures constant access to innovation. The solution’s flexibility enables organizations to drive their identity management solutions – not vice versa.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Evidian

Evidian Identity and Access Manager

Evidian Identity and Access Manager addresses issues by managing the four pillars of the Identity and Access Governance market: Identities, Policy, Process & Access. For everyone, access control will no longer be seen as a constraint, but as an opportunity for optimization instead. With Evidian Identity and Access Manager, only the right people access the right resources with the required rights for the right business reasons.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Beta Systems

Beta Systems Identity and Access Management

In the area of Identity Access Management, our innovative and well-proven software solutions provide companies and organizations with strong tools for handling critical access and risk management tasks.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

AlertEnterprise

AlertEnterprise Enterprise Guardian

The Enterprise Guardian Family of software products delivers enterprises, large and small, the ability to manage all of this for both Physical and Logical identity and access management. Business managers can now gauge risk and make decisions about how much access to grant certain individuals based on their roles.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Centrify Corporation

Centrify Identity Platform

The next generation enterprise security platform, built to protect against the leading point of attack for cyberthreats & data breaches — compromised credentials. Our products provide full identity security for employees, customers, partners, privileged IT admins and outsourced IT.

--

Composite Score

--

CX Score

+69

Emotional Footprint

89%

Likeliness to Recommend

1

Reviews

Load More

All Research

Latest Research

5
Aug

Author: Scott Bickley (Info-Tech)

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

Latest Research

10
Jul

Author: Shastri Sooknanan (Info-Tech)

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.

Latest Research

15
Apr

Author: Michelle Tran (Info-Tech)

Okta announces its new partnerships with endpoint security vendors VMware Carbon Black, CrowdStrike, and Tanium. Integrating endpoint protection management analysis with Okta Verify’s user identity risk indicators, Okta Identity Cloud consolidates the information and creates a risk profile of the individual login attempt.

Latest Research

15
Jan

Author: Ian Mulholland (Info-Tech)

Avatier, an IAM vendor, has developed an innovative solution for automating mundane IAM tasks: a chatbot called Apollo. Apollo is a great example of how ANI can enable simple task automation that ultimately frees up IT staff to tackle more pressing issues.

Latest Research

27
Sep

Author: Ian Mulholland (Info-Tech)

Recent data released from SoftwareReviews' Identity Access Management (IAM) Customer Experience Report reveals Symantec VIP is performing above the rest when it comes to providing good customer service.

Latest Research

17
Sep

Author: Ian Mulholland (Info-Tech)

HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users using HID technology.

Latest Research

20
Aug

Author: Ian Mulholland (Info-Tech)

Based on a recent survey conducted by Enterprise Management Associates (EMA), organizations are confused about what privileged access management (PAM) is and whether they are using it effectively within their organization.

Latest Research

18
Jul

Author: Frank Trovato (Info-Tech)

Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations running both Windows and Linux.

Latest Research

4
Jun

Author: Rita Zurbrigg (Info-Tech)

Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.

Latest Research

27
May

Author: Ian Mulholland (Info-Tech)

SAP SE announced on April 30, 2019, that business-to-business (B2B) functionality has come to its customer identity and access management (CIAM) solutions.

Latest Research

3
May

Author: Yaj Bhattacharya (Info-Tech)

Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using biometrics and FIDO2-compatible hardware is the better, and more secure, method of multi-factor authentication.

Latest Research

26
Apr

Author: George Goodall (Info-Tech)

Good IT leaders are supported by great IT teams. Take the opportunity to reassess the makeup and capabilities of the team.

Latest Research

29
Mar

Author: Jeremy Roberts (Info-Tech)

Amazon Glacier is hardly an expensive storage option. But for those users who store massive amounts of rarely needed data, it may not be worthwhile. Enter Glacier Deep Archive, an even cheaper storage option for data with an access SLA of 12 hours.

Latest Research

25
Sep

Author: George Goodall (Info-Tech)

Old file shares are a mess. Clean them up by identifying documents that are high-risk or high-value and get rid of everything else. Use a tool you didn’t know you owned to do it.