Results for: identity access management

Suggested Categories:

Identity Management Software
Identity management software is a system designed to manage and secure digital identities across an organization. It ensures that users have appropriate access to resources by handling identity creation, maintenance, and deactivation throughout the identity lifecycle. The software includes features such as role-based access control, single sign-on (SSO), and directory services to streamline identity administration. By automating processes like user provisioning and deprovisioning, it enhances efficiency while reducing human errors and security risks. Identity management software is essential for maintaining compliance with regulatory standards and protecting sensitive information from unauthorized access.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
Identity and Access Management (IAM) Software
Identity and Access Management (IAM) software is a security solution that manages and controls user access to digital resources within an organization. It ensures that the right individuals have access to the appropriate resources at the right times and for the right reasons. IAM systems provide tools for user authentication, authorization, and lifecycle management, helping to enforce security policies and compliance requirements. They often integrate features like single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC) to streamline access and reduce the risk of unauthorized entry. By centralizing access controls, IAM software enhances operational efficiency, minimizes security risks, and provides audit trails for regulatory purposes.
Customer Identity and Access Management (CIAM) Software
Customer identity access management (CIAM) software enables organizations to store, manage, and handle customer identities and user data.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Identity Verification Software
Identity verification software enables businesses to confirm the identity of individuals by using a variety of technologies such as biometrics, document verification, and database checks. It ensures that users are who they claim to be, reducing fraud and improving security during onboarding processes or transactions. The software often includes features like facial recognition, ID document scanning, and multi-factor authentication for robust identity verification. By automating and streamlining the verification process, it increases efficiency, enhances user trust, and ensures compliance with regulatory requirements like Know Your Customer (KYC). Ultimately, identity verification software protects businesses from fraudulent activity while maintaining a smooth and secure user experience.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Decentralized Identity Solutions
Decentralized identity solutions are a type of technology that seeks to create a secure virtual identity for users, providing them with secure access to various online services and resources. These solutions allow users to own their digital identities, removing security and privacy concerns associated with relying on third parties for authentication and authorization. This makes it possible for users to control which data they share with others, while granting access only to authorized entities. Moreover, decentralized identity solutions provide reliable authentication services which can be used across multiple platforms.
Non-Human Identity Management Software
Non-human identity management software is designed to manage and secure the identities of non-human entities, such as bots, applications, devices, and services within an organization's IT environment.
Extended Access Management (XAM) Software
Extended Access Management (XAM) software is a modern cybersecurity solution designed to bridge the "Access Trust Gap" in today's hybrid and remote work environments. Traditional Identity and Access Management (IAM) and Mobile Device Management (MDM) tools often fall short in securing unmanaged applications and personal devices. XAM addresses this by providing comprehensive visibility and control over all user identities, applications—both managed and unmanaged—and devices. It enforces contextual access policies based on real-time device health, user behavior, and application usage, ensuring that only trusted entities can access sensitive resources. By integrating with existing IAM and MDM systems, XAM enhances security without disrupting user productivity, making it an essential component for organizations aiming to secure their digital ecosystems.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Employee Identity Theft Protection Software
Employee identity theft protection software and services allow organizations to offer their employees with effective identity theft protection in order to protect the employee from identity theft, as well as protect the organization from threats related to employee identity theft.
Identity Governance and Administration (IGA) Software
Identity Governance and Administration (IGA) software is software designed to manage and control user identities and access rights within an organization. It enables businesses to automate the provisioning, de-provisioning, and management of user accounts across various systems and applications. IGA software also provides tools for enforcing security policies, conducting access reviews, and ensuring compliance with regulatory requirements. By offering real-time visibility into who has access to what, the software helps organizations mitigate risks and prevent unauthorized access to sensitive data. Ultimately, IGA software enhances security, streamlines identity management processes, and ensures that access rights are aligned with organizational policies and business needs.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
OT Secure Remote Access Software
OT secure remote access software enables authorized engineers, technicians, and third-party vendors to securely connect to Operational Technology (OT) networks — like industrial control systems (ICS), SCADA, PLCs, and other critical infrastructure — from remote locations. It replaces traditional VPNs and jump-servers with modern security practices such as Zero Trust Network Access (ZTNA), least-privilege access, multi-factor authentication (MFA), and session isolation to reduce attack surfaces. These solutions often include network segmentation, protocol isolation, access logging, and session recording to ensure compliance, auditability, and protection against credential theft or lateral movement. For legacy or vulnerable OT devices that cannot be patched easily, “network-cloaking” or “invisible network” techniques help hide devices from unauthorized scans. Overall, OT secure remote access software allows remote management, maintenance, and troubleshooting of critical infrastructure while preserving security, reliability, and compliance.
View more categories (20) for "identity access management"

59 Products for "identity access management" with 1 filter applied:

  • 1
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our...
  • 2
    Delinea DevOps Secret Vault
    Enable app-to-app communications and app-to-database access without hardcoding credentials. Secure access to tools for software and infrastructure deployment, testing, orchestration, and configuration. Centrally manage, control, and audit secrets for automated processes that operate without human oversight. Deploy rapidly with cloud-native SaaS architecture and elastic scalability that static, IP-based PAM solutions can’t provide.
  • 3
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction...
  • 4
    Red Hat Runtimes
    ...A collection of runtimes, frameworks, and languages so developers and architects can choose the right tool for the right task. Support is included for Quarkus, Spring Boot, Vert.x, and Node.js. An in-memory distributed data management system designed for scalability and fast access to large volumes of data. An identity management system that enables developers to provide web single sign-on capabilities based on industry standards for enterprise security. A message broker that offers specialized queueing behaviors, message persistence, and manageability. An open source implementation of the Java™ platform, standard edition (Java SE) supported and maintained by the OpenJDK community.
  • 5
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. ...
    Leader badge
    Starting Price: $0
  • 6
    Galgos AI

    Galgos AI

    Galgos AI

    ...It integrates AI-guided DevOps best practices to automatically produce Terraform, CloudFormation, and Kubernetes manifests that adhere to organizational compliance policies and security standards. By requesting resources in plain English—such as network configurations, identity and access management settings, encryption, logging, and monitoring- you accelerate cloud provisioning while benefiting from built-in modules for cost optimization and industry-standard frameworks (CIS, NIST, PCI DSS). It keeps its policy library up to date, performs real-time validation with remediation suggestions, and offers drift detection with auto-generated fixes. ...
  • 7
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 8
    Azure Deployment Environments
    Azure Deployment Environments provides devs with self-service, project-based templates to deploy environments for any stage of development. Support collaboration and innovation with consistent environments and best practices, and encourage experimentation and InnerSource use while maximizing security, compliance, and cost efficiency. Deploy the right environment at the right time without worrying about backend processes. Provision complex environments in minutes without waiting for your...
  • 9
    Codezero

    Codezero

    Codezero Technologies

    Boost development team productivity by leveraging existing Kubernetes infrastructure to create local environments that closely mirror production. Eliminate configuration errors, onboarding times, and guesswork debugging with logs to catch bugs earlier in the development cycle. Capture specific rays of traffic in order to crush those hard-to-reproduce errors without log diving, guesswork and deploying to test. Our best-in-class traffic shaping tools are developer friendly and do not...
  • 10
    JS7 JobScheduler
    JS7 JobScheduler is an Open Source workload automation system designed for performance, resilience and security. It provides unlimited performance for parallel execution of jobs and workflows. JS7 offers cross-platform job execution, managed file transfer, complex no-code job dependencies and a real REST API. Platforms - Cloud scheduling from Containers for Docker®, Kubernetes®, OpenShift® etc. - True multi-platform scheduling on premises for Windows®, Linux®, AIX®, Solaris®, macOS® etc. - Hybrid use for cloud and on premises User Interface - Modern, no-code GUI for inventory management, monitoring and control with web browsers - Near real-time information brings immediate visibility of status changes and log output of jobs and workflows - Multi-client capability, role based access management High Availability - Redundancy and Resilience based on asynchronous design and autonomous Agents - Clustering for all JS7 products, automatic fail-over and manual switch-over
    Starting Price: $1440/year
    Partner badge
    View Software
    Visit Website
  • 11
    Bitrise

    Bitrise

    Bitrise

    Bitrise is a CI/CD platform built for mobile development, helping teams speed up builds, automate testing, and deliver high-quality apps faster. It supports native languages like Swift, Objective-C, Java, and Kotlin, as well as cross-platform frameworks including React Native, Flutter, Xamarin, Cordova, and Ionic. Setup takes minutes, with customizable workflows that adapt to any project. Bitrise integrates with GitHub, GitLab, and other industry-standard tools, while its cloud...
    Starting Price: $89/month
    View Software
    Visit Website
  • 12
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for...
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 13
    TeamCity

    TeamCity

    JetBrains

    Powerful Continuous Integration out of the box. Define up to 100 build configurations (jobs) and run unlimited builds. Run up to 3 builds concurrently. Add extra agents when necessary. Utilize the full potential of all the TeamCity features. This product includes features identical to those available to our largest customers. Receive peer support through the forum, alternatively file a bug or feature request, and vote for them in our public issue tracker. Unlimited users, unlimited build...
    Starting Price: $18/month
  • 14
    Headlessforms

    Headlessforms

    Headlessforms

    Headlessforms provides a simple and intuitive form solution that is powerful and comprehensive, offering an array of features to construct and customize your forms with speed and ease. Customize your notifications and email templates to reflect your brand identity. Then, let Headlessforms send them to respondents automatically. It’s form submission magic for your business. We validate your data server-side and use machine learning in order to protect you from spam. In addition, we offer...
    Starting Price: $19 per month
  • 15
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can...
    Leader badge
    Starting Price: $0 Free Community Edition
    Partner badge
  • 16
    Azure Resource Manager
    Azure Resource Manager is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment. When a user sends a request from any of the Azure tools, APIs, or SDKs, Resource Manager receives the request.
  • 17
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git,...
    Starting Price: $6 per seat per month
  • 18
    Strong Network

    Strong Network

    Strong Network

    Strong Network allows the management of containers for DevOps online (as opposed to locally on developers laptop) and access them through a cloud IDE or a SSH connection (in the case of a local IDE). These containers provide a complete management of access keys and credentials to multiple types of resources, in addition to providing data loss prevention (DLP). In addition we combine the IDE with a secure chrome browser (remote browser isolation) such that any third party applications for DevOps can be accessed with DLP. ...
    Starting Price: $39
  • 19
    Windocks

    Windocks

    Windocks

    ...Windocks database orchestration allows for code-free end to end automated delivery. This includes masking, synthetic data, Git operations and access controls, as well as secrets management. Windocks can be installed on standard Linux or Windows servers in minutes. It can also run on any public cloud infrastructure or on-premise infrastructure. One VM can host up 50 concurrent database environments.
    Starting Price: $799/month
    Partner badge
  • 20
    iTivity SSH Manager

    iTivity SSH Manager

    iTivity Corporation

    iTivity SSH Manager is an automated tunnel management and access management solution that is easy to deploy, effortless to maintain, and infinitely scalable. iTivity works by automatically connecting all of your servers and devices — on any network — to a central management server to form a fully-encrypted, overlay hypernetwork. A single sign-on to iTivity gives you access to every device on the hypernetwork through a single pane of glass. iTivity dramatically simplifies provisioning, DevOps, and administration. iTivity makes devices and data more secure. ...
    Starting Price: Free Unlimited License
  • 21
    Ansys Cloud Direct
    Access Ansys Cloud Direct anywhere, anytime to obtain endless simulation capabilities compatible with most Ansys solvers. Engineering simulation has long been constrained by fixed computing resources available on a desktop or cluster. Ansys Cloud provides access to on-demand, cloud-based computing resources, including both interactive workstations and HPC clusters, for faster, high-fidelity results offering greater performance insight. Ansys Cloud increases simulation throughput by removing...
  • 22
    Appcircle

    Appcircle

    Appcircle

    Automated Mobile DevOps platform for continuous integration, continuous delivery and continuous testing of mobile apps. Enterprise-Grade Control and Flexibility. Appcircle is a NoOps Platform. No need for dedicated DevOps resources and know-how. Reduce your operational costs by up to 20%. Automate and streamline your continuous integration and continous delivery processes for mobile app development. Automation Done Right. No need for manual coding and constant monitoring for build automation...
    Starting Price: $39 per month
  • 23
    Azure Blueprints
    Simplify largescale Azure deployments by packaging key environment artifacts, such as Azure Resource Manager templates, role-based access controls, and policies, in a single blueprint definition. Easily apply the blueprint to new subscriptions and environments, and fine-tune control and management through versioning. Easily create your cloud governance templates, access controls, and policies as a single compliant package so environments are ready to be configured. ...
  • 24
    Movestax

    Movestax

    Movestax

    ...Whether you’re just starting out or scaling fast, Movestax offers the services you need to grow. Deploy frontend and backend applications instantly, with integrated CI/CD. Fully managed, scalable PostgreSQL, MySQL, MongoDB, and Redis that just work. Create sophisticated workflows and integrations directly within your cloud infrastructure. Run scalable serverless functions, automating tasks without managing servers. Simplify user management with Movestax’s built-in authentication system. Access pre-built APIs and foster community collaboration to accelerate development. ...
    Starting Price: $20/month
  • 25
    SwiftStack

    SwiftStack

    SwiftStack

    SwiftStack is a multi-cloud data storage and management platform for data-driven applications and workflows, seamlessly providing access to data across both private and public infrastructure. SwiftStack Storage is an on-premises, scale-out, and geographically distributed object and file storage product that starts from 10s of terabytes and expands to 100s of petabytes. Unlock your existing enterprise data and make it accessible to your modern cloud-native applications by connecting it into the SwiftStack platform. ...
  • 26
    Ambassador

    Ambassador

    Ambassador Labs

    .... - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience
  • 27
    IBM Cloud Developer Console for Apple
    Focus on your idea. IBM will make it production-ready through the automatic configuration of your development environment, seamless integration with a DevOps toolchain and easy access to add AI, database and mobile services. Autoconfigure your development, testing and production Kubernetes and Cloud Foundry environments. Use your stack or pick a pre-integrated starter kit preconfigured for cloud-native app development. Get on-demand access to a set of cloud services made for application...
  • 28
    Cruz Operations Center (CruzOC)
    ...The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
    Starting Price: $1350
  • 29
    Split

    Split

    Harness

    In a world where product development teams are pressured to do more with less, Split’s Feature Data Platform™ gives you the confidence to move fast without breaking things. Set up feature flags and safely deploy to production, controlling who sees which features and when. Connect every flag to contextual data, so you know if your features are making things better or worse, and act without hesitation. Effortlessly conduct feature experiments like A/B tests without slowing down. Split is...
  • 30
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and...
    Leader badge
    Starting Price: $1499.00/year
  • Previous
  • You're on page 1
  • 2
  • Next