Best Software for 2025 is now live!
|| products.size

Best Identity and Access Management (IAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity and access management (IAM) software helps companies protect their systems from unauthorized access or misuse by only allowing authenticated, authorized users (typically employees, based on job roles) to access specific, protected company systems and data. IT administrators leverage the software to quickly provision, deprovision, and change user identities and the corresponding user access rights at scale. IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees are in compliance with company policies and regulations.

Many IAM solutions include single sign-on (SSO) and password manager features. For employees, once users authenticate by signing into their accounts or using other multi-factor authentication methods, they are granted limited access to company systems allowed by their user type to complete their typical job functions.

Identity and access management software is different from privileged access management (PAM) software. IAM software is used to authorize, authenticate, and grant specific access to everyday users, such as company employees, while PAM software is used to provide administrative or superusers with granular access to business-critical assets and privileged credentials. IAM software also differs from customer identity and access management (CIAM) software, which provides a company’s customers—opposed to employees—with secured access to customer applications.

To qualify for inclusion in the Identity and Access Management (IAM) category, a product must:

Provision and deprovision user identities
Assign access based on individual role, group membership, and other factors
Enforce user access rights based on permissions
Verify user identity with authentication, which may include multi-factor authentication methods
Integrate with directories that house employee data

Best Identity and Access Management (IAM) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
220 Listings in Identity and Access Management (IAM) Available
(3,045)4.5 out of 5
Optimized for quick response
4th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:$9.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a cloud directory program that provides user management, system provisioning, and authentication services across multiple platforms.
    • Users like its intuitive design, ease of use, robust security features, and the ability to manage users, devices, and access in one place, making it ideal for remote and hybrid work environments.
    • Users experienced issues with the initial setup being complicated for new users, the user interface having a learning curve, and some features not working properly when offline.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    719
    Device Management
    510
    Integrations
    327
    Security
    324
    Easy Integrations
    285
    Cons
    Missing Features
    262
    Improvement Needed
    222
    Limited Features
    147
    Lack of Features
    105
    Learning Curve
    96
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.4
    Tracking
    Average: 8.7
    9.0
    User provisioning
    Average: 9.0
    8.2
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    37,102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    828 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a cloud directory program that provides user management, system provisioning, and authentication services across multiple platforms.
  • Users like its intuitive design, ease of use, robust security features, and the ability to manage users, devices, and access in one place, making it ideal for remote and hybrid work environments.
  • Users experienced issues with the initial setup being complicated for new users, the user interface having a learning curve, and some features not working properly when offline.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
719
Device Management
510
Integrations
327
Security
324
Easy Integrations
285
Cons
Missing Features
262
Improvement Needed
222
Limited Features
147
Lack of Features
105
Learning Curve
96
JumpCloud features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.4
Tracking
Average: 8.7
9.0
User provisioning
Average: 9.0
8.2
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
37,102 Twitter followers
LinkedIn® Page
www.linkedin.com
828 employees on LinkedIn®
(788)4.5 out of 5
5th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    199
    Security
    189
    Identity Management
    128
    Single Sign-On
    118
    SSO (Single Sign-On)
    101
    Cons
    Expensive
    65
    Authentication Issues
    45
    Complexity
    45
    Difficult Learning
    40
    Integration Issues
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Tracking
    Average: 8.7
    9.0
    User provisioning
    Average: 9.0
    8.5
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
199
Security
189
Identity Management
128
Single Sign-On
118
SSO (Single Sign-On)
101
Cons
Expensive
65
Authentication Issues
45
Complexity
45
Difficult Learning
40
Integration Issues
40
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.8
Tracking
Average: 8.7
9.0
User provisioning
Average: 9.0
8.5
On-premises solution
Average: 8.3
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
By Okta
(886)4.5 out of 5
1st Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Okta
Save to My Lists
Entry Level Price:$2 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    106
    Security
    62
    Easy Access
    51
    Authentication
    49
    Single Sign-On
    42
    Cons
    Authentication Issues
    39
    Frequent Authentication
    23
    Login Issues
    22
    Password Issues
    13
    Complex Setup
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    9.1
    Tracking
    Average: 8.7
    9.3
    User provisioning
    Average: 9.0
    9.1
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,286 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 41% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
106
Security
62
Easy Access
51
Authentication
49
Single Sign-On
42
Cons
Authentication Issues
39
Frequent Authentication
23
Login Issues
22
Password Issues
13
Complex Setup
9
Okta features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
9.1
Tracking
Average: 8.7
9.3
User provisioning
Average: 9.0
9.1
On-premises solution
Average: 8.3
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,286 Twitter followers
LinkedIn® Page
www.linkedin.com
8,122 employees on LinkedIn®
(6,645)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Rippling
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Autom

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 62% Mid-Market
    • 35% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Rippling is an application that provides a centralized platform for payroll, benefits, PTO, and other employee-facing interfaces.
    • Reviewers like the ease of use, the ability to access important documents and pay stubs, the option to add multiple bank accounts for salary, and the efficient real-time operation of the platform.
    • Reviewers noted some issues with the design being somewhat unwelcoming and complex, the training taking a long time, the lack of a more in-depth tutorial, and the occasional need for a third-party authenticator.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rippling Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3,775
    Intuitive
    2,796
    Simple
    2,336
    User Interface
    1,983
    Easy Access
    1,916
    Cons
    Missing Features
    706
    Limited Features
    441
    Not User-Friendly
    425
    Learning Curve
    387
    Poor Interface Design
    386
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rippling features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    9.1
    Tracking
    Average: 8.7
    9.3
    User provisioning
    Average: 9.0
    9.2
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rippling
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @Rippling
    9,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,863 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Autom

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 62% Mid-Market
  • 35% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Rippling is an application that provides a centralized platform for payroll, benefits, PTO, and other employee-facing interfaces.
  • Reviewers like the ease of use, the ability to access important documents and pay stubs, the option to add multiple bank accounts for salary, and the efficient real-time operation of the platform.
  • Reviewers noted some issues with the design being somewhat unwelcoming and complex, the training taking a long time, the lack of a more in-depth tutorial, and the occasional need for a third-party authenticator.
Rippling Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3,775
Intuitive
2,796
Simple
2,336
User Interface
1,983
Easy Access
1,916
Cons
Missing Features
706
Limited Features
441
Not User-Friendly
425
Learning Curve
387
Poor Interface Design
386
Rippling features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
9.1
Tracking
Average: 8.7
9.3
User provisioning
Average: 9.0
9.2
On-premises solution
Average: 8.3
Seller Details
Seller
Rippling
Company Website
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@Rippling
9,128 Twitter followers
LinkedIn® Page
www.linkedin.com
3,863 employees on LinkedIn®
(2,940)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    884
    Features
    412
    Useful
    381
    Customizability
    379
    Customization
    353
    Cons
    Learning Curve
    281
    Complexity
    270
    Expensive
    237
    Missing Features
    237
    Limitations
    230
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    8.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    584,242 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 36% Enterprise
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
884
Features
412
Useful
381
Customizability
379
Customization
353
Cons
Learning Curve
281
Complexity
270
Expensive
237
Missing Features
237
Limitations
230
Salesforce Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.1
8.8
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
8.7
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
584,242 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
(394)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    90
    Authentication Ease
    60
    Security
    60
    Authentication
    53
    Easy Access
    45
    Cons
    Authentication Issues
    32
    Access Limitations
    24
    Login Issues
    21
    Notification Issues
    15
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Tracking
    Average: 8.7
    9.4
    User provisioning
    Average: 9.0
    9.4
    On-premises solution
    Average: 8.3
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
    • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
    • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
    • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
90
Authentication Ease
60
Security
60
Authentication
53
Easy Access
45
Cons
Authentication Issues
32
Access Limitations
24
Login Issues
21
Notification Issues
15
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
9.4
Tracking
Average: 8.7
9.4
User provisioning
Average: 9.0
9.4
On-premises solution
Average: 8.3
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
  • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
  • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
  • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,873 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
(27)4.6 out of 5
View top Consulting Services for Oracle Identity Cloud Service
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs.

    Users
    No information available
    Industries
    • Automotive
    Market Segment
    • 48% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Oracle Identity Cloud Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Cloud Services
    4
    Customer Support
    4
    Easy Integrations
    4
    Features
    3
    Cons
    Lack of Expertise
    4
    Slow Performance
    4
    Expensive
    3
    Poor User Interface
    3
    Needs Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.1
    8.1
    Tracking
    Average: 8.7
    8.8
    User provisioning
    Average: 9.0
    8.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    824,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199,405 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs.

Users
No information available
Industries
  • Automotive
Market Segment
  • 48% Mid-Market
  • 41% Enterprise
Oracle Identity Cloud Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Cloud Services
4
Customer Support
4
Easy Integrations
4
Features
3
Cons
Lack of Expertise
4
Slow Performance
4
Expensive
3
Poor User Interface
3
Needs Improvement
2
Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.1
8.1
Tracking
Average: 8.7
8.8
User provisioning
Average: 9.0
8.7
On-premises solution
Average: 8.3
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
824,139 Twitter followers
LinkedIn® Page
www.linkedin.com
199,405 employees on LinkedIn®
Ownership
NYSE:ORCL
(16)4.5 out of 5
View top Consulting Services for Google Cloud Identity
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Security
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,520,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 25% Small-Business
Google Cloud Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Security
1
Cons
Expensive
1
Google Cloud Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.1
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,520,271 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permiss

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 28% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Identity and Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    7
    Ease of Use
    6
    Easy Management
    6
    Policy Management
    4
    Security
    4
    Cons
    Missing Features
    4
    Learning Curve
    3
    Poor User Interface
    3
    Access Permissions
    2
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    8.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,230,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permiss

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 28% Small-Business
AWS Identity and Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
7
Ease of Use
6
Easy Management
6
Policy Management
4
Security
4
Cons
Missing Features
4
Learning Curve
3
Poor User Interface
3
Access Permissions
2
Complexity
2
AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
8.0
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
8.4
On-premises solution
Average: 8.3
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,230,610 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a us

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Vertrified Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    10
    Ease of Use
    7
    Easy Access
    4
    Intuitive
    3
    Simple
    3
    Cons
    Expensive
    2
    Internet Dependency
    1
    Limited Customization
    1
    Missing Data
    1
    Poor User Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Vertrified Access features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    9.8
    Tracking
    Average: 8.7
    9.8
    User provisioning
    Average: 9.0
    9.8
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,230,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a us

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 29% Enterprise
AWS Vertrified Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
10
Ease of Use
7
Easy Access
4
Intuitive
3
Simple
3
Cons
Expensive
2
Internet Dependency
1
Limited Customization
1
Missing Data
1
Poor User Interface
1
AWS Vertrified Access features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.1
9.8
Tracking
Average: 8.7
9.8
User provisioning
Average: 9.0
9.8
On-premises solution
Average: 8.3
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,230,610 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
By IBM
(139)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Enterprise
    • 38% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify is a tool for validating the identity of people, providing an additional layer of security and facilitating user access management.
    • Users like the advanced authentication methods, including MFA and adaptive measures, the streamlined user access through single SSO, and the ease of integration with other systems.
    • Users reported difficulties in monitoring access risks, a complex learning curve, and a high cost compared to other solutions in the market.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    37
    Ease of Use
    27
    Authentication
    25
    Identity Management
    23
    Features
    21
    Cons
    Difficult Learning
    12
    Expensive
    12
    Complexity
    9
    Complex Setup
    9
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.4
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    8.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    711,154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Enterprise
  • 38% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify is a tool for validating the identity of people, providing an additional layer of security and facilitating user access management.
  • Users like the advanced authentication methods, including MFA and adaptive measures, the streamlined user access through single SSO, and the ease of integration with other systems.
  • Users reported difficulties in monitoring access risks, a complex learning curve, and a high cost compared to other solutions in the market.
IBM Verify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
37
Ease of Use
27
Authentication
25
Identity Management
23
Features
21
Cons
Difficult Learning
12
Expensive
12
Complexity
9
Complex Setup
9
Cost
9
IBM Verify features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.1
8.4
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
8.4
On-premises solution
Average: 8.3
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,154 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Cloud Management
    7
    Customer Support
    7
    Insights
    7
    Monitoring
    6
    Cons
    Limited Features
    5
    Feature Limitations
    3
    Improvement Needed
    3
    Lack of Features
    3
    Missing Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Tracking
    Average: 8.7
    9.3
    User provisioning
    Average: 9.0
    8.9
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Mid-Market
  • 43% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Cloud Management
7
Customer Support
7
Insights
7
Monitoring
6
Cons
Limited Features
5
Feature Limitations
3
Improvement Needed
3
Lack of Features
3
Missing Features
3
Tenable Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.1
8.9
Tracking
Average: 8.7
9.3
User provisioning
Average: 9.0
8.9
On-premises solution
Average: 8.3
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(1,362)4.7 out of 5
15th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    102
    Security
    77
    Intuitive
    32
    Password Management
    31
    Secure Sharing
    31
    Cons
    Password Management
    43
    Authentication Issues
    27
    Login Issues
    22
    Process Complexity
    20
    Autofill Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Tracking
    Average: 8.7
    10.0
    User provisioning
    Average: 9.0
    10.0
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    142,100 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
102
Security
77
Intuitive
32
Password Management
31
Secure Sharing
31
Cons
Password Management
43
Authentication Issues
27
Login Issues
22
Process Complexity
20
Autofill Issues
18
1Password features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.6
Tracking
Average: 8.7
10.0
User provisioning
Average: 9.0
10.0
On-premises solution
Average: 8.3
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
142,100 Twitter followers
LinkedIn® Page
www.linkedin.com
2,449 employees on LinkedIn®
(63)4.8 out of 5
Optimized for quick response
6th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

    Users
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 87% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Descope Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Customer Support
    36
    Easy Integrations
    27
    Implementation Ease
    22
    Authentication
    21
    Cons
    Missing Features
    13
    Poor Documentation
    7
    Learning Curve
    6
    Difficult Learning
    5
    Lack of Information
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Descope features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Tracking
    Average: 8.7
    9.8
    User provisioning
    Average: 9.0
    10.0
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Descope
    Company Website
    Year Founded
    2022
    HQ Location
    Los Altos, California
    Twitter
    @descopeinc
    477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

Users
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 87% Small-Business
  • 13% Mid-Market
Descope Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Customer Support
36
Easy Integrations
27
Implementation Ease
22
Authentication
21
Cons
Missing Features
13
Poor Documentation
7
Learning Curve
6
Difficult Learning
5
Lack of Information
5
Descope features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.1
9.6
Tracking
Average: 8.7
9.8
User provisioning
Average: 9.0
10.0
On-premises solution
Average: 8.3
Seller Details
Seller
Descope
Company Website
Year Founded
2022
HQ Location
Los Altos, California
Twitter
@descopeinc
477 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(48)4.4 out of 5
View top Consulting Services for Google Cloud Identity & Access Management (IAM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fine-grained access control and visibility for centrally managing cloud resources.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 25% Small-Business
    • 15% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity & Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Access Control
    4
    Easy Integrations
    3
    Flexibility
    3
    Admin Control
    2
    Cons
    Access Control
    1
    Complexity
    1
    Complex Setup
    1
    Difficulty Locating
    1
    Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    7.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,520,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Fine-grained access control and visibility for centrally managing cloud resources.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 25% Small-Business
  • 15% Enterprise
Google Cloud Identity & Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Access Control
4
Easy Integrations
3
Flexibility
3
Admin Control
2
Cons
Access Control
1
Complexity
1
Complex Setup
1
Difficulty Locating
1
Documentation
1
Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.8
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
7.7
On-premises solution
Average: 8.3
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,520,271 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG

Learn More About Identity and Access Management (IAM) Software

What is Identity and Access Management (IAM) Software?

Companies use identity and access management (IAM) software to both enforce their security controls regarding who has access to corporate assets and to promote worker productivity with ease of access to the tools they need to do their jobs. IAM software achieves this by allowing only authorized and authenticated users, such as employees, contractors, and devices, to access corporate resources at their appropriate permission level based on predetermined policy-based controls. 

Using IAM software, company administrators can quickly provision, deprovision, or change user identities and access rights to corporate assets at scale. Each user is granted the right level of access permissions based on their user or group membership type. This makes it easier for security teams to manage who has access to what accounts at scale, and for end users to quickly gain access to the tools they need to do their jobs instead of waiting for their individual accounts to be provisioned one by one. For example, a newly promoted departmental leader at a company may need permissions to fully access the proprietary data stored within an application. This can easily be granted to them due to their management group membership, while a junior-level employee would not need that kind of granular access, so they would only be permissioned to view non sensitive data stored within the application. IAM software also tracks user activity, enabling administrators to confirm that users are accessing corporate assets in compliance with company policies.

Using IAM software and utilizing policy-based controls to enforce least privilege strategies, companies can protect against unauthorized access from both external actors like hackers and non permissioned internal users (insider threats) who have insufficient access level permissions. IAM software is used as an important component of a company’s zero-trust, least-privilege security model, where all users’ identities are verified prior to granting access to corporate resources. This is different from prior security models that enforced perimeter security where once a user is inside the corporate network, they are granted free access and movement across the network, and not required to be authenticated again to use other applications.

What Does IAM Stand For?

IAM, sometimes also listed as IdAM, stands for identity and access management. IAM software is sometimes also referred to as workforce identity or employee identity management. Other acronyms related to IAM include CIAM for customer identity and access management (CIAM) software which is used for customer-related identity management. Similarly, for government-related identity products, the acronym ICAM stands for Identity, credential, and access management. Another acronym, IDaaS, stands for identity as a service.

What are the Common Features of Identity and Access Management (IAM) Software?

The following are some core features within IAM software:

Authentication: IAM providers offer multi-factor authentication (MFA) methods for users to prove their identity prior to being granted access to corporate resources. MFA requires more than a single authentication factor, such as only a username and password. Authentication factors can include one-time passcodes (OTPs), software tokens, mobile-push, hardware tokens, and more. More advanced authentication methods include biometric authentication and passwordless authentication. 

More recently, IAM providers are utilizing risk-based authentication (RBA) methods, also known as contextual authentication, intelligent MFA, or adaptive MFA, which analyzes real-time information about users, such as their IP addresses, devices, and behaviors to continually verify their identity. 

Identity lifecycle management or user provisioning and deprovisioning: IAM software providers offer administrators the ability to manage the lifecycle of an identity—from quickly provisioning to deprovisioning, along with user changes including attributes, roles, permissions, and other entitlements. Some IAM providers also offer a universal directory.

Directory: IAM providers will either integrate with existing directory providers or offer a universal directory service.

Single sign-on (SSO): IAM software provides SSO functionality to enable end users to access their business applications all in one place and requiring them to authenticate once.

User activity monitoring: IAM software enables administrators to track user activity, including anomalous activity. This kind of auditing is to ensure compliance with secure access control policies. IAM solutions often provide standard reports for this.

What are the Benefits of Identity and Access Management (IAM) Software?

Security: The main benefit of implementing identity and access manager software is for improved security. IAM software manages access governance, allowing only verified, authorized, and permissioned users to access company assets. This helps mitigate risks from external hackers or insider threats.

Productivity or enabling the workforce: In addition to improved security, companies that deploy IAM software to streamline the login experience, may lead to productivity gains with users. Having a simple to use security product with SSO requiring only one login and that also organizes the user’s corporate applications and accounts all in one place can save the user time and frustration. 

Regulatory compliance: Many global governmental or industry regulations require companies to have security controls to be in place. Identity management is a major component of a well-rounded information security program.

Who Uses Identity and Access Management (IAM) Software?

Information security (infosec) professionals: Infosec professionals use IAM software as a foundational component of their security program.

IT Administrators: IT admins may be responsible for managing IAM software, especially as it relates to provisioning and deprovisioning users.

End users and devices: End users such as employees or contractors use IAM software in their day-to-day work activities to access corporate assets needed to do their jobs. Devices such as internet of things (IoT) devices require the validity of their identity in order to access corporate resources, including other IoT devices.

What are the Alternatives to Identity and Access Management (IAM) Software?

Alternatives to IAM solutions can replace this type of software, either partially or completely include:

Single sign-on (SSO) software: SSO software, which is a component of a complete IAM software solution, is an authentication tool that allows users to sign into multiple applications or databases with a single set of credentials. SSO software will not have identity governance and user lifecycle management features that an IAM solution would provide.

Multi-factor authentication (MFA) software: MFA, which is a component of a complete IAM software solution, is used to have users prove their identity in two or more ways before granting them access privileges to corporate accounts. There are many types of authentication factors above the standard single factor of login credentials like usernames and passwords, including something the user has like a mobile device or security token, something the user is, such as a scan of their faceprint or fingerprint, or somewhere the user is, like their geographical location and IP address. Newer forms of MFA include risk-based authentication and passwordless authentication.

Password manager software: Password manager software, or password management software, stores a user's individual passwords through either an encrypted vault downloaded to a user’s computer or mobile device, or digitally through browser plugins or extensions. The passwords stored in this software are managed by the user, not by a corporate administrator.

Software Related to Identity and Access Management (IAM) Software

Related solutions that can be used together with IAM software include many types of identity management software:

Customer identity and access management (CIAM) software: CIAM software is similar to IAM software, but used for customer identities instead of workforce identities like employees, contractors, and corporate devices. 

Privileged access management (PAM) software: PAM software helps companies protect the most critical IT resources by ensuring the credentials of their privileged accounts, such as admin accounts are only accessed by those with proper permissions to do so. When users access these privileged accounts, they must check in and check out and are often monitored during the time they are using the privileged account. PAM solutions are used in conjunction with IAM software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. 

User provisioning and governance tools: User provisioning and governance tools enable companies to manage user account identities throughout their lifecycle, including provisioning and deprovisioning. These solutions are often deployed on-premises, but many tools are offering cloud-based solutions, as well. 

Cloud directory services software: Similar to user provisioning and governance tools, cloud directory services software enables companies to manage user identities throughout their lifecycle, including provisioning and deprovisioning, in a cloud-deployed manner. Companies use these tools as they transition away from traditional on premises or locally operating identity management software to cloud services and SaaS applications. 

Challenges with Identity and Access Management (IAM) Software

Identity management solutions and IAM systems can come with their own set of challenges. 

Policy and group management: Managing corporate access policies and group management is a company policy-related issue, not necessarily a technical one. It can get overwhelming for IAM administrators when companies have undefined or even conflicting policies as to which users have access to what resources. Administrators may be asked by leadership to provide users with much higher levels of access than their policy or group access control would normally allow, thus introducing risks into the environment.

Identity for cloud vs. on-premises applications: Depending on the company’s technology stack, businesses may have a mix of both on-premises and cloud-based applications and resources. Companies must ensure that their IAM solution has connectors to the types of systems they need support for, especially for hybrid IT environments.

Insufficient MFA methods: It is important that the MFA component of the identity program is strong to prevent unauthorized use which can lead to data breaches. Many IAM providers are moving away from less secure MFA methods, such as email one-time-passcodes to stronger authentication methods like risk-based authentication or contextual authentication.

How to Buy Identity and Access Management (IAM) Software

Requirements Gathering (RFI/RFP) for Identity and Access Management (IAM) Software

When gathering and prioritizing the company's requirements, it is important to consider the following factors.

Ease for end users: In order for IAM software to be effective, end users have to actually use it. The IAM solution must be easy to use by the end user and become part of their everyday routine. 

Authentication methods: Are there limitations on the types of authentication factors that the company’s employees, contractors, and devices can use? For example, employees may be able to use authentication methods such as hardware tokens and biometrics, while temporary contractors might rely on in-app mobile pushes or OTPs sent via email, SMS, or phone. Additionally, if employees in a manufacturing facility or healthcare unit cannot carry a mobile phone with them, authentication factors requiring a mobile device may not be suitable.

Regional considerations: Is the company global? Does the IAM solution need to support multiple languages, use cases, and adhere to local data protection regulations? Businesses must ensure the IAM provider can accommodate the company’s geographic and regional-based needs.

Integrations: Companies should determine which integrations are important to them. The most critical integration would likely be the user directory solution, such as an HR system, if a directory is not provided by or being used within the IAM solution.

Timeline: The company must decide how quickly they need to implement the solution.

Level of support: Buyers should know if they require high-quality support or if they prefer implementing the solution in house.

Compare Identity and Access Management (IAM) Software Products

Create a long list

There are many providers of IAM software. The best way to begin narrowing the search for products that would work well for the company would be to start by company segment size, such as small, medium, or enterprise-size businesses. By visiting the Identity and Access Management (IAM) software page on G2.com, buyers can filter solutions by market segment using the left-hand filter radio buttons.

Create a short list

After looking through IAM solutions for particular company size, buyers should ensure it meets the authentication and regional needs. If a specific language is a requirement, buyers can filter solutions by language by visiting the Identity and Access Management (IAM) software page on G2.com. For other requirements, such as how easy it is to use, the “Easiest to use” section of the Identity and Access Management (IAM) software page on G2 helps compare options. Users can further narrow the selection by reading user reviews, checking the product’s ranking on the G2 Grid® report for the Identity and Access Management (IAM) software category, and reading other related IAM-related resources.

Conduct demos

At each demo, buyers must be sure to ask the same questions and use case scenarios to best evaluate each product. Potential buyers can contact many vendors directly on g2.com to request demos by selecting the “Get a quote” button. 

Selection of Identity and Access Management (IAM) Software

Choose a selection team

The selection team should include the day-to-day administrator of this product, who is likely an information security or related cybersecurity professional or an IT administrator professional. Companies may also consider having someone from HR join the selection committee to provide context regarding new hire onboarding and employee offboarding, as it relates to the user provisioning or deprovisioning aspect of IAM software. And lastly, it is important to include a typical day-to-day end user to ensure that the end user experience is easy to use and can be widely adopted by the workforce.

Negotiation

When negotiating the contract, buyers must consider pricing, implementation, and support. Typically longer length contracts and larger license counts can improve price discounting. 

Final decision

The final decision maker should likely be the day-to-day administrator of the solution, likely an information security professional or an IT administrator professional, with input from other stakeholders on the selection team. Prior to purchasing an IAM solution, buyers should check if they can get a trial period to test with a small number of users before going all in on the product. If the tool is well received by end users and administrators, businesses can feel more confident in their purchase.