Identity and Access Management (IAM) Software
Filter
Showing 1–12 of 13 results
Akku is a comprehensive cloud-based solution designed to help businesses strengthen their operations, enhance compliance and risk control, improve visibility, and reduce costs while providing better insights for informed decision-making.
Cognito is a comprehensive Identity and Access Management software that offers an efficient identity verification service.
ForgeRock Identity Platform is an advanced identity and access management solution that uses artificial intelligence to provide complete IAM and IGA services.
GroupID is a software solution designed to simplify the lives of IT professionals responsible for managing Active Directory, Azure Active Directory, and Office 365. Its primary objective is to automate the management of groups and users.
Halogen Software is an industry-leading performance and talent management tool that has earned a reputation for excellence among HR professionals worldwide.
IBM Security Verify Access, previously known as IBM Security Access Manager or ISAM, is a comprehensive solution that simplifies user access and enhances security across web, mobile, IoT, and cloud technologies.
ID-Pal is a revolutionary platform that simplifies the process of establishing trust between businesses and their customers.
PrivX is a state-of-the-art Privileged Access Management (PAM) software that offers efficient and user-friendly solutions for organizations.
IdentityIQ is a comprehensive identity governance platform that enables businesses to manage and control every file and application across their hybrid IT environment by employees, partners, contractors, and bots.
Salesforce Identity is a software that offers multi-factor authentication and single sign-on (SSO) facility.
Teamstack is a cloud-based Identity and Access Management (IAM) software that provides businesses with the ability to efficiently manage access to their applications and data.
Visual Guard is a robust application security framework that addresses today's cybersecurity challenges by providing organizations with the ability to control fine-grained permissions inside their applications, detect security breaches, monitor sensitive operations, and raise a scalable shield in the event of a cyberattack.