Ad Image

Identity and Access Management Solutions Directory

Below is a directory of Identity and Access Management vendors, tools and software solutions including a company overview, links to social media and contact information for the top-31 Identity Management providers. If you would like a printed version of this page including complete solutions profiles and a list of the top questions to ask in an RFP – Request for Proposal, click here for a Free PDF.

Solutions Overview

With its flagship Avatier Identity Management Suite (AIMS), California-based solution provider Avatier offers a suite of independently-licensed IAM products focused on offering usability and quick time-to-value. Avatier’s...

With its flagship Avatier Identity Management Suite (AIMS), California-based solution provider Avatier offers a suite of independently-licensed IAM products focused on offering usability and quick time-to-value. Avatier’s most prominent strength is its unique approach which extends its IAM automation and selfservice capabilities beyond the traditional enterprise use-cases.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Avatier’s AIMS 10 solution is a strong choice for small to mid-sized businesses (SMBs) looking for a simple, manageable product with relatively easy, low effort maintenance demands and a focus on self-service capabilities. However, larger enterprises and SMBs have both found Avatier satisfactory to their identity security needs.

Solutions Overview

Auth0 provides a platform to authenticate, authorize, and secure access for applications, devices, and users. Auth0 values simplicity, extensibility, and expertise enable security and application teams to make identity wo...

Auth0 provides a platform to authenticate, authorize, and secure access for applications, devices, and users. Auth0 values simplicity, extensibility, and expertise enable security and application teams to make identity work for everyone in their organizations. Auth0’s Authentication platform features frictionless logins, Single Sign-On, while its Access Management Platform offers API Authorization and RBAC. Its authentication capabilities include diverse options such as Step-Up and adaptive multifactor to fir with unique use cases.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Auth0 appears in the 2020 Gartner Magic Quadrant as a Challenger, in part because of its CIAM capabilities and offerings. Customers’ praise its ABAC for machine-to-machine access, its authentication, and its Single Sign-On integration. Recently, Okta completed its acquisition of Auth0 for $6.5 billion, promising unique and powerful future technology integrations for identity management.

Solutions Overview

Since acquiring CA Technologies in 2018, Broadcom has folded CA Technologies’ end-to-end Identity Management portfolio with its Identity Suite, Secure Cloud IDaaS solution, Single Sign-On, Advanced Authentication and Priv...

Since acquiring CA Technologies in 2018, Broadcom has folded CA Technologies’ end-to-end Identity Management portfolio with its Identity Suite, Secure Cloud IDaaS solution, Single Sign-On, Advanced Authentication and Privileged Access Management Capabilities. In fact, they renamed their CA Technologies portfolio to the Layer7 Identity Management solution. Layer7 provides an integrated solution for on-premises and cloud application provisioning and governance that manages user identities throughout their entire lifecycle. Broadcom’s identity management also increases audit and compliance efficiency through streamlined governance campaigns. Additionally, it helps manage identities with consumer-grade scalability and real-time policy enforcement.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Before its acquisition, CA Technologies was named to the Gartner 2018 Privileged Access Management Magic Quadrant as a Leader. In 2019, they received attention as a Visionary in the Gartner Magic Quadrant for Access Management; since Broadcom incorporated CA Technologies’ portfolio into their own, they should have the capabilities to protect complex and demanding environments. Broadcom emphasizes their automated risk mitigation and scalability as well as their protection of hybrid enterprise IT environments. They continue to mature their PAM capabilities for enterprises.

Solutions Overview

Curity serves as a major supplier of API-driven identity management, providing unified security for digital services. The Curity Identity Server operates as an OAuth and OpenID Connect Server; enterprises can use it for l...

Curity serves as a major supplier of API-driven identity management, providing unified security for digital services. The Curity Identity Server operates as an OAuth and OpenID Connect Server; enterprises can use it for logging in and securing users’ access to web and mobile apps over APIs and microservices as the business scales. Also, the Curity Identity Server is built upon open standards designed for development and operations. The provider can address the enterprise-grade API security needs of organizations in financial services, telecom, retail, energy, and government services.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

The Curity Identity Server offers a combination of IAM and API management. The server’s flexibility and scalability make it a strong choice for organizations providing an extensive number of digital services to different kinds of users, both internally and externally. Curity’s solution allows customers full control of the security platform, offering the necessary tools to handle the complexities of identity security standards. Curity offers a straightforward pricing structure with a flat annual subscription including unlimited number of users and servers and instant-message Slack support.

Fischer Identity 2022
Solutions Overview

Based out of Florida, Fischer International provides their IAM solution: Identity as a Service (IaaS), an enterprise-grade full-suite identity solution for either your private cloud or on-premise servers. Fischer Identity...

Based out of Florida, Fischer International provides their IAM solution: Identity as a Service (IaaS), an enterprise-grade full-suite identity solution for either your private cloud or on-premise servers. Fischer Identity offers user provisioning for end-user full-life cycle management, access governance, self-service password management, SSO/Federation and five factor authentication to securely manage identities in complex corporate environments.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Fischer’s full IAM suite capabilities will match the needs of SMBs and larger enterprises alike, especially those concerned with insider threats. Fischer’s authentication architecture should eliminate the need for customization, ideal for those looking to set their privileged access management controls without hassle.

ForgeRock
Solutions Overview

Norwegian-based IAM provider ForgeRock offers a unique entry to this list in that they offer one of the only open source IAM platforms on the market. The ForgeRock Identity Platform is built on Sun Microsystem’s open sour...

Norwegian-based IAM provider ForgeRock offers a unique entry to this list in that they offer one of the only open source IAM platforms on the market. The ForgeRock Identity Platform is built on Sun Microsystem’s open source IAM projects and includes a set of APIs, allowing for the efficient and rapid development of new services ready for deployment in the cloud or on mobile devices. Mobile enhancements to the platform support OAuth 2.0 and OpenID Connect. ForgeRock also offers the ForgeRock Identity Relationship Management platform, aimed at helping CIOs address IAM challenges at internet scale via REST API’s for IAM, an identity gateway, and directory services. They helm the ForgeRock Trust Network, which has over 50 partners.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

ForgeRock’s innovative track record and focus on scalability makes it ideal for organizations requiring large solution deployments. It is affordable and has advanced support for IoT advanced compared to competitors. In 2019, they updated their Zero Trust architecture and improved their CARTA-like security offerings. The open source nature of its solutions requires significant customization which in turn needs significant skill to manage and utilize. However, this allows for a high degree of flexibility and scalability.

FusionAuth
Solutions Overview

FusionAuth is a single-tenant CIAM solution for enterprise web and mobile applications. Built for developers, FusionAuth’s REST API is designed to scale from 1 to 1 billion users without creating complications in service....

FusionAuth is a single-tenant CIAM solution for enterprise web and mobile applications. Built for developers, FusionAuth’s REST API is designed to scale from 1 to 1 billion users without creating complications in service.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

FusionAuth’s REST API installs on macOS, Linux, Windows and cloud servers with no differences in service or security quality. Their pre-built client libraries allow developers to quickly integrate the solution with popular programming languages, and their detailed documentation defines the methods and parameters available to enterprises.

HID Global
Solutions Overview

Formerly Crossmatch, HID Global offers an array of solutions ranging from biometric sensors and read modules; these include OEM embedded reader modules and finished desktop readers that validate identity using fingerprint...

Formerly Crossmatch, HID Global offers an array of solutions ranging from biometric sensors and read modules; these include OEM embedded reader modules and finished desktop readers that validate identity using fingerprints or hard tokens. HID Global’s solutions can integrate into existing business systems, both analog and digital. Its solutions feature advanced multifactor authentication, credential management, and analytics. A philosophy of Zero Trust drives its innovations and facilitates digital certification. HID Global also provides access control systems with support for a wide range of credential technologies. Also, they tailor its specific solutions to match with different verticals and use cases.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Crossmatch’s company mission statement is to move customers beyond passwords by presenting users with a range of more convenient (and secure) authentication options while simultaneously driving those options to end-users through context and policies. Specialized solutions for government, defense, and law enforcement make Crossmatch an attractive solution for both public sector users and mid-sized enterprises. Crossmatch is perhaps most prominently known as a biometric authentication solution provider, but their capabilities also allow for extensive granular and multifactor authentication protocols.

IBM 2022
Solutions Overview

Well known for its security analytics, IBM entered the IDaaS market in 2014 with the purchase of Lighthouse Security Group. IBM has since established itself in the market with its Cloud Identity Service offering, a rebran...

Well known for its security analytics, IBM entered the IDaaS market in 2014 with the purchase of Lighthouse Security Group. IBM has since established itself in the market with its Cloud Identity Service offering, a rebranding of Lighthouse’s IDaaS product.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

IBM’s Identity solutions are ideal for large organizations with global footprints. IBM is one of the most recognized cybersecurity solution providers currently in the market, with some of the most comprehensive and talented identity security research teams in the industry.

Solutions Overview

Texas-based Identity Automation’s signature RapidIdentity product supports identity governance and administration capabilities, automated provisioning, access and account management in both on-premises and asa- service de...

Texas-based Identity Automation’s signature RapidIdentity product supports identity governance and administration capabilities, automated provisioning, access and account management in both on-premises and asa- service deployments. The solution also boasts secure single sign-on access to nearly any enterprise system, multifactor authentication across all applications and databases, and time-based access expiration.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Identity Automation’s RapidIdentity is a smart choice for organizations and enterprises of all sizes looking to replace legacy identity and access management solutions and home-grown tools with a new next-generation system. Rapid Identity can be deployed in a matter of weeks, rather than months or years. Identity Automation offers a broad set of out-of-the-box and configurable capabilities.

Solutions Overview

ManageEngine, the IT management division of Zoho Corporation, offers its. AD360 platform. The AD360 is an integrated identity and access management (IAM) solution designed to assist enterprises in managing and securing us...

ManageEngine, the IT management division of Zoho Corporation, offers its. AD360 platform. The AD360 is an integrated identity and access management (IAM) solution designed to assist enterprises in managing and securing user identities while facilitating identity governance and ensuring compliance. It helps simplify IAM by providing a complete suite of tools that offer considerable advantages over native tools. Using AD360, administrators can monitor and manage their enterprise’s on-premises, cloud, and hybrid environments from a single console.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Gartner’s Voice of Customer (VOC) for the Identity Governance and Administration (IGA) recognized AD360. AD360 helps enterprises to adapt to the evolving security landscape. It helps ensures efficient management of identities across target systems, mitigates risks by automation, and optimizes governance. Its out-of-the-box compliance reports can streamline compliance management and prevent regulatory risks.

microsoft
Solutions Overview

Easily the biggest name brand in this 2019 Identity and Access Management Buyer’s Guide, Microsoft only made its first foray into the IDaaS market relatively recently with the 2014 release of its Azure Active Directory (A...

Easily the biggest name brand in this 2019 Identity and Access Management Buyer’s Guide, Microsoft only made its first foray into the IDaaS market relatively recently with the 2014 release of its Azure Active Directory (AAD) Premium service. Since then, the hardware and software technology giant has already made a large impact on the identity security market.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Microsoft makes a strong choice for enterprise customers deeply familiar with Microsoft’s ecosystem, or who already use Microsoft’s Azure cloud PaaS service. It will also suit those who are looking for basic identity management capabilities.

My1Login
Solutions Overview

My1Login seeks to utilize Single Sign-On (SSO) and Privileged Password Management that works with all application types by controlling user access and centralizing identity. The SSO solution works for web, mobile, and non...

My1Login seeks to utilize Single Sign-On (SSO) and Privileged Password Management that works with all application types by controlling user access and centralizing identity. The SSO solution works for web, mobile, and non-browser applications in all kinds of architecture. Their Password Manager solutions offers SSO without revealing credentials, audited access to privileged accounts, and permission-based sharing. Additionally, My1Login integrates with web apps, virtualized apps and even Windows desktop apps without requiring APIs. Thus they can provide SSO seamlessly linked to the user’s directory login. My1Login has no ability to access customer data since this is encrypted client-side, using keys that are safely secured inside the customer’s environment.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

The potential of client-side encryption could create appeal for My1Login’s Single Sign-On and Privileged Password Management solutions among security forces, the public sector and financial services organizations. Also, its automated user provisioning for account lifecycle management makes My1Login well-suited to mid-market and larger enterprises, especially as My1Login seeks to minimize IT admin workloads. Integration of various multi-factor authentication methods enabling contextual authentication policies to be applied can also address end-user SSO for an enterprise’s customers or partners.

Solutions Overview

Micro Focus owns the NetIQ identity and access management suite, a highly scalable set of solutions. This suite is offered with several optional add- ons, such as Access Review—an identity governance add-on—and the NetIQ ...

Micro Focus owns the NetIQ identity and access management suite, a highly scalable set of solutions. This suite is offered with several optional add- ons, such as Access Review—an identity governance add-on—and the NetIQ Access Governance Suite (AGS). Micro Focus’s Identity Manager centralizes enterprise access administration and ensures that every user has one singular identity— from your physical and virtual networks to the cloud—with a highly flexible solution and strong provisioning capabilities ideal for a variety of business use cases. As such, Micro Focus can monitor and record all enterprise users’ activities within the provisioned systems. The Net IQ Suite also includes Group Policy Administrator, Change Guardian, and Access Manager products.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Through the NetIQ suite, Micro Focus offers a robust yet affordable identity governance and administration-focused solution with a large network of channel partners, ideal for small to mid-sized businesses. Recently, they appeared in the Gartner 2019 Critical Capabilities for Identity Governance and Administration report; moreover, they were named as a Challenger in the 2019 Gartner Magic Quadrant for Identity Governance and Administration and a Visionary in Gartner’s 2019 Access Management Magic Quadrant.

okta
Solutions Overview

Okta’s Identity-as-a-Service (IDaaS) offering boasts one of the fastest-growing customer bases in the market and the funding to match. The Okta Identity Management Service provides centralized directory services, single s...

Okta’s Identity-as-a-Service (IDaaS) offering boasts one of the fastest-growing customer bases in the market and the funding to match. The Okta Identity Management Service provides centralized directory services, single sign-on, strong authentication, provisioning, workflow, and reporting, all delivered as a multitenant IDaaS with some components operating on-premise.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Okta’s lightweight, multi-tenant delivery model is highly scalable, and therefore ideal for organizations with simple identity administration and provisioning capabilities. Their new data centers make the company an ideal IDaaS solution for small to mid-sized businesses on either side of the Atlantic.

Solutions Overview

Omada’s Solution Directory should read: The Omada Identity Suite (OIS) provides an enterprise platform for identity management and identity governance that is available either by component or as a comprehensive system. OI...

Omada’s Solution Directory should read: The Omada Identity Suite (OIS) provides an enterprise platform for identity management and identity governance that is available either by component or as a comprehensive system. OIS features a flexible data model, excellent dashboards and powerful reporting capabilities, including closed loop reporting.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

User-facing elements of all identity lifecycle scenarios support a flexible data model for user entitlements. Omada also offers specific provisioning services and industry-tailored solutions for several verticals including Banking and Finance, Life-Sciences, Manufacturing, Public, Utilities, and Retail.

Solutions Overview

One Identity offers solutions with a modular and integrated approach to user account management that provides rapid time-to-value. One Identity does this by offering comprehensive functionality that allows customers to bu...

One Identity offers solutions with a modular and integrated approach to user account management that provides rapid time-to-value. One Identity does this by offering comprehensive functionality that allows customers to build on their existing security investments.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

One Identity’s strong out-of-box governance capabilities make the solution an ideal fit for organizations looking for a strong governance solution with good SAP integration and DAG integration. Its focus has historically been narrowly IAM rather than on wider security offerings, so hybrid systems might be necessary.

OneLogin
Solutions Overview

California-based OneLogin provides on-demand IDaaS solutions consisting of single sign-on, multi-factor authentication, directory integration, user provisioning capabilities. They also include a catalog of pre-integrated ...

California-based OneLogin provides on-demand IDaaS solutions consisting of single sign-on, multi-factor authentication, directory integration, user provisioning capabilities. They also include a catalog of pre-integrated applications.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

OneLogin makes an excellent IDaaS solution for organizations of any size looking for powerful SSO, directory, and MFA capabilities. Their support is highly user focused, and it deploys well with only minimal adjustments.

Solutions Overview

Initially founded in 2005 as a consulting company, the Florida-based Optimal IdM has since evolved into a global provider of affordable identity and access management solutions. The privately held company offers both on-p...

Initially founded in 2005 as a consulting company, the Florida-based Optimal IdM has since evolved into a global provider of affordable identity and access management solutions. The privately held company offers both on-premise solutions, such as its Virtual Identity Server and Federation and Identity Services, and cloud hosted solutions such as OptimalCloud.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Optimal IdM’s customization, scalability, and affordable monthly payment plans make it an ideal solution for growing SMBs or enterprises looking to expand their national or global footprint. They offer a flat fee pricing model for services, which will be a blessing for the budget-conscious business.

Solutions Overview

The Oracle Identity Governance (OIG) Suite is an integrated identity suite that centralizes security for enterprises’ applications and web services, and provides a single point of contact for support under a single licens...

The Oracle Identity Governance (OIG) Suite is an integrated identity suite that centralizes security for enterprises’ applications and web services, and provides a single point of contact for support under a single license contract. OIG suite is marketed for large enterprise customers with global footprints.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Oracle’s modular Identity Governance solution is well suited for large organizations with complex IGA needs, including industry compliance needs. Oracle products come highly recommended for those already running a portfolio of Oracle products, but those new to Oracle will find a strong solution regardless.

Ping Identity
Solutions Overview

Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing the right people to access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, C...

Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing the right people to access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, Cisco, GE, Kraft Foods and Walgreens, trust Ping Identity to accelerate their move to the cloud, deliver a rich customer experience and quickly onboard partners as part of their digital transformation.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Ping Identity’s solution is ideal for organizations looking for a scalable identity and access management solution capable of supporting multiple employee, customer and partner identity use cases on premises and in the cloud. Ping’s market emphasis is on large enterprises, and they have the services and support staff to make good on that interest.

Radiant Logic
Solutions Overview

A provider of federated identity systems based on virtualization, Radiant Logic delivers standards-based access to all identities within an organization.Their solution, the RadiantOne FID federated identity and directory ...

A provider of federated identity systems based on virtualization, Radiant Logic delivers standards-based access to all identities within an organization.Their solution, the RadiantOne FID federated identity and directory service, enables customizable identity views built from disparate data silos—along with scalable sync and storage—to drive critical authentication, authorization, and provisioning decisions for web access management, federation, cloud, and cloud directory deployments.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

RadiantOne FID integrates and orchestrates identity across multiple systems and targets, allowing large enterprises to get more from existing investments while making the most of new investments and opportunities. By consolidating AD domains and forests into a common directory to provisioning to cloud directories, RadiantOne allows for rapid responses to new demands such as onboarding new apps, integrating a newly merged or acquired company, or scaling to hundreds of millions of users and queries.

Solutions Overview

Still operating under the Dell umbrella, RSA offers both IDaaS and traditional identity management and identity governance and administration solutions. RSA Identity Management and Governance (RSA IMG) is a highly scalabl...

Still operating under the Dell umbrella, RSA offers both IDaaS and traditional identity management and identity governance and administration solutions. RSA Identity Management and Governance (RSA IMG) is a highly scalable identity management suite built from separately licensed components.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

RSA’s strong suite of independently licensed identity governance and administration modules makes the vendor a good fit for companies of all sizes looking for IGA solutions. RSA was recognized in 2018 as a Strong Performer in Identity Governance by Forrester, and they were chosen as a leader in IGA by KuppingerCole.

Sailpoint
Solutions Overview

SailPoint offers both traditional Identity Management with its IdentityIQ solution as well as IdentityNow, a multi-tenant Identity-as-a-Service (IDaaS) solution. IdentityIQ is offered as a stand-alone, on-premises product...

SailPoint offers both traditional Identity Management with its IdentityIQ solution as well as IdentityNow, a multi-tenant Identity-as-a-Service (IDaaS) solution. IdentityIQ is offered as a stand-alone, on-premises product with several optional add-ons. SailPoint’s Identity IQ is well-regarded for its strong identity governance capabilities and provisioning capabilities.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

SailPoint’s background as an innovator in identity access and governance makes the company an ideal fit for large organizations seeking comprehensive IGA capabilities. Their product is considered comprehensive and effective. It also scales well for complex enterprise deployments.

salesforce identity management companies 2020
Solutions Overview

Salesforce is primarily designed and marketed as a customer relationship management platform, focused on sales, service, and marketing efficiency and strategy. They entered the Identity and Access Management market in 201...

Salesforce is primarily designed and marketed as a customer relationship management platform, focused on sales, service, and marketing efficiency and strategy. They entered the Identity and Access Management market in 2013 with the release of Salesforce Identity, an IDaaS solution that is both offered as an independent service and as part of Salesforce’s cloud Platform-as-a-Service (PaaS) solution offering.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Salesforce’s IDaaS solution is available as an independent service. The solution is best suited for organizations that are operating in customer service and retail industries such as in a CIAM context. This is where Salesforce’s market share is most prominent.

saviynt identity governance tools
Solutions Overview

Solutions provided by Saviynt enables enterprises to secure applications, data, and corporate infrastructure in a single cloud or on-premise platform. They approach identity governance and administration holistically, mov...

Solutions provided by Saviynt enables enterprises to secure applications, data, and corporate infrastructure in a single cloud or on-premise platform. They approach identity governance and administration holistically, moving beyond core Identity Governance to cloud security, application GRC, and access governance—all within a complete cloud-based solution.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Enterprise customers praise the capability and the prowess of the Saviynt solution and remark on the ease of deployment. Saviynt has strong strategic partnerships with Microsoft, Okta, and Ping Identity which speaks to their extensive integration versatility.

Solutions Overview

The SecureAuth Identity Platform with SSO, adaptive authentication, multi-factor authentication, risk-based engine, user life cycle management, and biometric passwordless real-time threat solutions. SecureAuth offers spec...

The SecureAuth Identity Platform with SSO, adaptive authentication, multi-factor authentication, risk-based engine, user life cycle management, and biometric passwordless real-time threat solutions. SecureAuth offers specific industry solutions for healthcare, energy, and retail, among other industries.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

The SecureAuth Identity Platform is a cloud-based Identity and Access Management solution for securing workforce and customer identities. SecureAuth customers in healthcare, finance, public security, and retail can secure cloud and on-prem apps protecting valuable assets while providing exceptional user experience.

SecZetta
Solutions Overview

With its Non-Employee Identity Risk and Lifecycle Management Platform, Massachusetts-based solution provider SecZetta offers a suite of independently-licensed products focused on offering ease of use and quick time-to-val...

With its Non-Employee Identity Risk and Lifecycle Management Platform, Massachusetts-based solution provider SecZetta offers a suite of independently-licensed products focused on offering ease of use and quick time-to-value. SecZetta’s most prominent strength is its unique approach to managing non-employees which includes a system of record for non-employees and extends business processes and delegated management to partners including self-service capabilities to non-employees. Their solutions can help organizations effectively manage, automate and control the business process of working with and engaging third party, non-employees.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

SecZetta’s non-employee identity risk and lifecycle platform is a strong choice for any organization looking for a flexible, robust product requiring no specialized skills to maintain and a focus on business process, automation, delegation and self-service capabilities. SecZetta distinguishes itself with a product purpose built to address the human aspect of non-employee identity risk and lifecycle. They work to translate good people data into good access management and reduced risk to organizations.

Simeio
Solutions Overview

Atlanta-based Simeio Solutions offers a variety of IAM solutions as both dedicated cloud hosting or on-premise managed services, including the only fully managed IDaaS offering featured in this 2019 Identity and Access Ma...

Atlanta-based Simeio Solutions offers a variety of IAM solutions as both dedicated cloud hosting or on-premise managed services, including the only fully managed IDaaS offering featured in this 2019 Identity and Access Management Buyer’s Guide. Simeio offers IDaaS to clients who want consumer IAM and/or CIAM capabilities as a service via on-premise, hosted on cloud or hybrid with a private cloud option available.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Simeio’s managed service offerings are recommended for enterprises looking to shift the heavy Identity and Access Management workload burden from their IT or security departments. Their managed services are competitively priced and offer a single point of contact for deployment and support, which will be a boon for those looking for comprehensive Identity and Access Management on a budget.

Ubisecure
Solutions Overview

Ubisecure is a European technology provider specializing in high scale customer IAM (CIAM) use-cases. Their Identity Platform is designed to enhance an enterprise’s customer-facing applications by providing a high-quality...

Ubisecure is a European technology provider specializing in high scale customer IAM (CIAM) use-cases. Their Identity Platform is designed to enhance an enterprise’s customer-facing applications by providing a high-quality experience to increase customer capture, conversion, and engagement.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Identity Platform is a strong choice for enterprises looking for a scalable IAM and CIAM platform to enhance their customer experience and to meet major compliance requirements like GDPR. They are mainly focused on the European marketplace, and therefore North American companies should investigate whether Ubisecure would meet their specific market needs before making their selection.

Tools4ever 2022
Solutions Overview

A well-regarded player in the IAM field for nearly two decades, Tools4Ever develops and provides standardized and affordable Identity Governance & Administration (IGA) solutions that can be implemented within a few w...

A well-regarded player in the IAM field for nearly two decades, Tools4Ever develops and provides standardized and affordable Identity Governance & Administration (IGA) solutions that can be implemented within a few weeks and are easily managed afterwards. Tools4ever’s software suite includes access management, password management, authorization management, and AD and NTFS auditing tools and capabilities.

Download this Directory and get our Free Identity & Access Management Buyer’s Guide.

Tools4ever’s quick deployment and consultant-assisted implementation options offer fast results and ROI. This makes the solution providers’ tools a good choice for both small to large-sized companies and enterprises looking to invest in IGA without the perceived headaches.