Results for: identity access management

Suggested Categories:

Identity Management Software
Identity management software is a system designed to manage and secure digital identities across an organization. It ensures that users have appropriate access to resources by handling identity creation, maintenance, and deactivation throughout the identity lifecycle. The software includes features such as role-based access control, single sign-on (SSO), and directory services to streamline identity administration. By automating processes like user provisioning and deprovisioning, it enhances efficiency while reducing human errors and security risks. Identity management software is essential for maintaining compliance with regulatory standards and protecting sensitive information from unauthorized access.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
Identity and Access Management (IAM) Software
Identity and Access Management (IAM) software is a security solution that manages and controls user access to digital resources within an organization. It ensures that the right individuals have access to the appropriate resources at the right times and for the right reasons. IAM systems provide tools for user authentication, authorization, and lifecycle management, helping to enforce security policies and compliance requirements. They often integrate features like single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC) to streamline access and reduce the risk of unauthorized entry. By centralizing access controls, IAM software enhances operational efficiency, minimizes security risks, and provides audit trails for regulatory purposes.
Customer Identity and Access Management (CIAM) Software
Customer identity access management (CIAM) software enables organizations to store, manage, and handle customer identities and user data.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Identity Verification Software
Identity verification software enables businesses to confirm the identity of individuals by using a variety of technologies such as biometrics, document verification, and database checks. It ensures that users are who they claim to be, reducing fraud and improving security during onboarding processes or transactions. The software often includes features like facial recognition, ID document scanning, and multi-factor authentication for robust identity verification. By automating and streamlining the verification process, it increases efficiency, enhances user trust, and ensures compliance with regulatory requirements like Know Your Customer (KYC). Ultimately, identity verification software protects businesses from fraudulent activity while maintaining a smooth and secure user experience.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Decentralized Identity Solutions
Decentralized identity solutions are a type of technology that seeks to create a secure virtual identity for users, providing them with secure access to various online services and resources. These solutions allow users to own their digital identities, removing security and privacy concerns associated with relying on third parties for authentication and authorization. This makes it possible for users to control which data they share with others, while granting access only to authorized entities. Moreover, decentralized identity solutions provide reliable authentication services which can be used across multiple platforms.
Non-Human Identity Management Software
Non-human identity management software is designed to manage and secure the identities of non-human entities, such as bots, applications, devices, and services within an organization's IT environment.
Extended Access Management (XAM) Software
Extended Access Management (XAM) software is a modern cybersecurity solution designed to bridge the "Access Trust Gap" in today's hybrid and remote work environments. Traditional Identity and Access Management (IAM) and Mobile Device Management (MDM) tools often fall short in securing unmanaged applications and personal devices. XAM addresses this by providing comprehensive visibility and control over all user identities, applications—both managed and unmanaged—and devices. It enforces contextual access policies based on real-time device health, user behavior, and application usage, ensuring that only trusted entities can access sensitive resources. By integrating with existing IAM and MDM systems, XAM enhances security without disrupting user productivity, making it an essential component for organizations aiming to secure their digital ecosystems.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Identity Governance and Administration (IGA) Software
Identity Governance and Administration (IGA) software is software designed to manage and control user identities and access rights within an organization. It enables businesses to automate the provisioning, de-provisioning, and management of user accounts across various systems and applications. IGA software also provides tools for enforcing security policies, conducting access reviews, and ensuring compliance with regulatory requirements. By offering real-time visibility into who has access to what, the software helps organizations mitigate risks and prevent unauthorized access to sensitive data. Ultimately, IGA software enhances security, streamlines identity management processes, and ensures that access rights are aligned with organizational policies and business needs.
Employee Identity Theft Protection Software
Employee identity theft protection software and services allow organizations to offer their employees with effective identity theft protection in order to protect the employee from identity theft, as well as protect the organization from threats related to employee identity theft.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
OT Secure Remote Access Software
OT secure remote access software enables authorized engineers, technicians, and third-party vendors to securely connect to Operational Technology (OT) networks — like industrial control systems (ICS), SCADA, PLCs, and other critical infrastructure — from remote locations. It replaces traditional VPNs and jump-servers with modern security practices such as Zero Trust Network Access (ZTNA), least-privilege access, multi-factor authentication (MFA), and session isolation to reduce attack surfaces. These solutions often include network segmentation, protocol isolation, access logging, and session recording to ensure compliance, auditability, and protection against credential theft or lateral movement. For legacy or vulnerable OT devices that cannot be patched easily, “network-cloaking” or “invisible network” techniques help hide devices from unauthorized scans. Overall, OT secure remote access software allows remote management, maintenance, and troubleshooting of critical infrastructure while preserving security, reliability, and compliance.
View more categories (20) for "identity access management"

23 Products for "identity access management" with 2 filters applied:

  • 1
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our...
  • 2
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction...
  • 3
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. ...
    Leader badge
    Starting Price: $0
  • 4
    Galgos AI

    Galgos AI

    Galgos AI

    ...It integrates AI-guided DevOps best practices to automatically produce Terraform, CloudFormation, and Kubernetes manifests that adhere to organizational compliance policies and security standards. By requesting resources in plain English—such as network configurations, identity and access management settings, encryption, logging, and monitoring- you accelerate cloud provisioning while benefiting from built-in modules for cost optimization and industry-standard frameworks (CIS, NIST, PCI DSS). It keeps its policy library up to date, performs real-time validation with remediation suggestions, and offers drift detection with auto-generated fixes. ...
  • 5
    JS7 JobScheduler
    JS7 JobScheduler is an Open Source workload automation system designed for performance, resilience and security. It provides unlimited performance for parallel execution of jobs and workflows. JS7 offers cross-platform job execution, managed file transfer, complex no-code job dependencies and a real REST API. Platforms - Cloud scheduling from Containers for Docker®, Kubernetes®, OpenShift® etc. - True multi-platform scheduling on premises for Windows®, Linux®, AIX®, Solaris®, macOS® etc. - Hybrid use for cloud and on premises User Interface - Modern, no-code GUI for inventory management, monitoring and control with web browsers - Near real-time information brings immediate visibility of status changes and log output of jobs and workflows - Multi-client capability, role based access management High Availability - Redundancy and Resilience based on asynchronous design and autonomous Agents - Clustering for all JS7 products, automatic fail-over and manual switch-over
    Starting Price: $1440/year
    Partner badge
    View Software
    Visit Website
  • 6
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for...
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 7
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can...
    Leader badge
    Starting Price: $0 Free Community Edition
    Partner badge
  • 8
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git,...
    Starting Price: $6 per seat per month
  • 9
    Appcircle

    Appcircle

    Appcircle

    Automated Mobile DevOps platform for continuous integration, continuous delivery and continuous testing of mobile apps. Enterprise-Grade Control and Flexibility. Appcircle is a NoOps Platform. No need for dedicated DevOps resources and know-how. Reduce your operational costs by up to 20%. Automate and streamline your continuous integration and continous delivery processes for mobile app development. Automation Done Right. No need for manual coding and constant monitoring for build automation...
    Starting Price: $39 per month
  • 10
    Movestax

    Movestax

    Movestax

    ...Whether you’re just starting out or scaling fast, Movestax offers the services you need to grow. Deploy frontend and backend applications instantly, with integrated CI/CD. Fully managed, scalable PostgreSQL, MySQL, MongoDB, and Redis that just work. Create sophisticated workflows and integrations directly within your cloud infrastructure. Run scalable serverless functions, automating tasks without managing servers. Simplify user management with Movestax’s built-in authentication system. Access pre-built APIs and foster community collaboration to accelerate development. ...
    Starting Price: $20/month
  • 11
    Ambassador

    Ambassador

    Ambassador Labs

    .... - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience
  • 12
    Cruz Operations Center (CruzOC)
    ...The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
    Starting Price: $1350
  • 13
    Split

    Split

    Harness

    In a world where product development teams are pressured to do more with less, Split’s Feature Data Platform™ gives you the confidence to move fast without breaking things. Set up feature flags and safely deploy to production, controlling who sees which features and when. Connect every flag to contextual data, so you know if your features are making things better or worse, and act without hesitation. Effortlessly conduct feature experiments like A/B tests without slowing down. Split is...
  • 14
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and...
    Leader badge
    Starting Price: $1499.00/year
  • 15
    Sail

    Sail

    Sail for WordPress

    Sail is a free and open source CLI tool to provision, manage and deploy WordPress applications in the DigitalOcean cloud. A great alternative to traditional shared and managed WordPress hosting for a fraction of the cost. Provision servers, create and restore backups, manage domains, DNS and SSL certificates, full root access, integrated performance profiling and much more. With Sail you can host WordPress on your own terms.
    Starting Price: $0
  • 16
    Aviator

    Aviator

    Aviator

    Put your mundane, frustrating workflows on autopilot. Get access to a world-class developer experience every step of the way: from writing, testing and reviewing code, to merging, building and deploying. Promote a culture of smaller PRs, stabilize flaky tests, or protect important branches from build failure. Aviators automation connects with your existing toolchain. Integrate with any CI provider, any source-control system, and other tools. Aviator empowers you to automate across your...
    Starting Price: $12 per user per month
  • 17
    Elestio

    Elestio

    Elestio

    ...Elestio supports deployment on various cloud providers, including DigitalOcean, AWS, VULTR, Hetzner, Linode, Scaleway, and on-premise environments, offering flexibility and control without vendor lock-in. All services are delivered on dedicated hardware, providing full access to underlying resources and kernel-level security. Connections between the user's computer, the dashboard, and services are encrypted end-to-end with TLS, ensuring data security. It also offers a fully managed CI/CD system, supporting GitHub, GitLab, and Docker registries as sources, and is compatible with any Linux tech stack.
  • 18
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure.
  • 19
    Octopus Deploy

    Octopus Deploy

    Octopus Deploy

    ...Runbook automation in Octopus sits side-by-side with your deployments and gives you control over your infrastructure and applications. Automate operations tasks like routine maintenance and emergency incident recovery. Flexible, role-based access control lets you manage who can deploy to production, change your deployment process, infrastructure, and more.
    Starting Price: Free
  • 20
    Leapwork

    Leapwork

    Leapwork

    Leapwork has created the world’s most accessible automation platform. Through a visual, no-code approach, Leapwork makes it easy for business and IT users to automate repetitive processes, so enterprises can adopt and scale automation faster. Leapwork is used by more than 400 global enterprises across all industries, from banks and insurance companies to life science, government and aerospace. Clients include NASA, PayPal, BNP Paribas and Daimler. The company is headquartered in Copenhagen,...
  • 21
    Mindflow

    Mindflow

    Mindflow

    Embrace hyper-automation at scale with intuitive no-code & AI-generated flows. Access every tool you need through the most extensive integration library ever provided. Pick the service you want from the Integrations library and automate your way. Onboard and build your first workflows in minutes. Use pre-built templates if you need them, help yourself with the AI assistant, or benefit from the Mindflow excellence center. Type your input in plain-language text and let Mindflow do the rest....
  • 22
    Unleash

    Unleash

    Bricks Software AS

    Unleash is an open-source feature management software, built with large enterprises in mind. It's private, secure, scalable, and ready for the most complex setups out-of-the-box. Move from all-or-nothing releases to safe and frequent deployments Instead of perfecting a merge and fixing bugs when a set of features go live, you can release individual changes to your users, then immediately roll them back if something goes wrong. Scale your software and infrastructure at your own...
    Starting Price: $0
  • 23
    Jira

    Jira

    Atlassian

    Jira is the only project management tool you need to plan and track work across every team. Jira by Atlassian is the #1 software development tool for teams planning and building great products. Trusted by thousands of teams, Jira offers access to a wide range of tools for planning, tracking, and releasing world-class software, capturing and organizing issues, assigning work, and following team activity.
    Leader badge
    Starting Price: Free
  • Previous
  • You're on page 1
  • Next