Compare and evaluate Identity and Access Management Software vendors using the most in-depth and unbiased analyst reports available. Download free comprehensive 40+ page reports to select the best Identity and Access Management Software software for your organization.
Quickly evaluate top vendors using our comprehensive market report. Compare product features, vendor strengths, user-satisfaction and more.
Don't settle for just any vendor – find the one you can trust. Use the Emotional Footprint report to see which vendors treat their customers right.
Identity Access Management (IAM) is a software-based framework of policies and technologies for ensuring that an organization has the appropriate access to technology resources. Identity and access management systems identify, authenticate and authorize individuals who access IT resources.
See the most recent winners of our SoftwareReviews Data Quadrant Awards. View our Gold Medalists and compare top vendors using our free downloadable reports.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
Balance digital trust and great user experiences—in any environment, on any device, and through any application.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Synchronize identities between directories, databases and applications. Enable self-service password, group and certificate management. Increase admin security and thwart identity theft with policies, privileged access and roles.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages an array of easily deployable authentication methods so users can quickly and easily gain access to their cloud applications, such as Microsoft 365, VPNs, corporate networks, Windows desktops, Citrix applications and more. Crossmatch was acquired by HID Global in September 2018.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Safeguard your company's information assets with identity and access management and security compliance. Manage business continuity and minimize cost and risk with an approach to identity and access management that drives security compliance.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
RSA Via is a set of SaaS and software solutions that work together to protect the entire identity and access lifecycle. It features a governance-driven approach to ensure consistency in access controls, regardless of the user’s location, device or where the resources reside. RSA Via ensures continuous compliance with changing rules and regulations without rendering current IAM investments obsolete.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Okta's products manage identity and access for millions of people on millions of devices. We offer products in two lines: IT Products and Platform.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Oracle’s complete, integrated next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs. Achieve rapid compliance with regulatory mandates. Secure sensitive applications and data—regardless of whether they are hosted on premises or in the cloud.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
With IdentityIQ at the center of your enterprise, you can control access to every file and application across your hybrid IT environment by employees, partners, contractors — even bots.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
RadiantOne’s full-spectrum identity service is the only IdM solution purpose-built to scale alongside your business, integrating with your evolving infrastructure.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Bomgar’s Privileged Access Management (PAM) solution enables organizations to control and manage privileged access to critical data and systems, while empowering users to be more productive. The solution consists of two components - Bomgar Privileged Identity and Bomgar Privileged Access. With Bomgar's integrated PAM solution you can protect privileged accounts and assets at the speed and scale of your business.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. Read more at http://www.ca.com/us/products/ca-identity-suite.html
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Courion provides a comprehensive suite of identity management and access governance solutions that help organizations minimize risk, streamline operations and reduce costs.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
The Hitachi ID Identity and Access Management Suite is designed as identity management and access governance middleware, in the sense that it presents a uniform user interface and a consolidated set of business processes to manage user objects, identity attributes, security rights and credentials across multiple systems and platforms.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
We believe identity powers everything. Our identity-centric approach to security reduces risk, improves user experience, drives innovation and increases business value. With our identity platform, organizations can integrate modern IAM policies and best practices across local, mobile and cloud environments. We provide organizations with the ability to integrate identity data (user, device, thing or service) to manage the identity lifecycle and control access. Our platform provides identity governance, access management, and privileged account management.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
With Dell One Identity Manager you can unify security policies, meet compliance needs and achieve governance while improving business agility today and in the future with a modular and scalable Identity and Access Management solution.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
The Avatier Identity Management Products improve business performance. Our business-focused identity management platform enables IT password, provisioning, and governance operations through workflow automation and self-service. Our products reduce information security complexity, while providing a single system of record for compliance reporting.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
We secure digital identities for people, devices, and connected things online. We verify who you are and what you can access.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Securely streamline all identity and access management with advanced, user-friendly RapidIdentity software from Identity Automation.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Omada Identity Suite is a technology leading enterprise solution for integrated identity and access management, governance and compliance. Omada Identity Suite provides a dynamic and adaptable yet fully integrated enterprise platform for both identity management and identity governance.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Fischer Identity simplifies, accelerates, and automates the complex task of managing identities for on- and off-premise resources with no limits to scalability or reach, and ensures constant access to innovation. The solution’s flexibility enables organizations to drive their identity management solutions – not vice versa.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
Evidian Identity and Access Manager addresses issues by managing the four pillars of the Identity and Access Governance market: Identities, Policy, Process & Access. For everyone, access control will no longer be seen as a constraint, but as an opportunity for optimization instead. With Evidian Identity and Access Manager, only the right people access the right resources with the required rights for the right business reasons.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
In the area of Identity Access Management, our innovative and well-proven software solutions provide companies and organizations with strong tools for handling critical access and risk management tasks.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
The Enterprise Guardian Family of software products delivers enterprises, large and small, the ability to manage all of this for both Physical and Logical identity and access management. Business managers can now gauge risk and make decisions about how much access to grant certain individuals based on their roles.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
The next generation enterprise security platform, built to protect against the leading point of attack for cyberthreats & data breaches — compromised credentials. Our products provide full identity security for employees, customers, partners, privileged IT admins and outsourced IT.
Composite Score
CX Score
Emotional Footprint
Likeliness to Recommend
Reviews
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.
Okta announces its new partnerships with endpoint security vendors VMware Carbon Black, CrowdStrike, and Tanium. Integrating endpoint protection management analysis with Okta Verify’s user identity risk indicators, Okta Identity Cloud consolidates the information and creates a risk profile of the individual login attempt.
Avatier, an IAM vendor, has developed an innovative solution for automating mundane IAM tasks: a chatbot called Apollo. Apollo is a great example of how ANI can enable simple task automation that ultimately frees up IT staff to tackle more pressing issues.
Recent data released from SoftwareReviews' Identity Access Management (IAM) Customer Experience Report reveals Symantec VIP is performing above the rest when it comes to providing good customer service.
HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users using HID technology.
Based on a recent survey conducted by Enterprise Management Associates (EMA), organizations are confused about what privileged access management (PAM) is and whether they are using it effectively within their organization.
Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations running both Windows and Linux.
Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.
SAP SE announced on April 30, 2019, that business-to-business (B2B) functionality has come to its customer identity and access management (CIAM) solutions.
Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using biometrics and FIDO2-compatible hardware is the better, and more secure, method of multi-factor authentication.
Good IT leaders are supported by great IT teams. Take the opportunity to reassess the makeup and capabilities of the team.
Amazon Glacier is hardly an expensive storage option. But for those users who store massive amounts of rarely needed data, it may not be worthwhile. Enter Glacier Deep Archive, an even cheaper storage option for data with an access SLA of 12 hours.
Old file shares are a mess. Clean them up by identifying documents that are high-risk or high-value and get rid of everything else. Use a tool you didn’t know you owned to do it.