You must be logged in to access this page.

Best Identity and Access Management (IAM) Software - Page 13

BS
Researched and written by Brandon Summers-Miller

Identity and access management (IAM) software helps companies protect their systems from unauthorized access or misuse by only allowing authenticated, authorized users (typically employees, based on job roles) to access specific, protected company systems and data. IT administrators leverage the software to quickly provision, deprovision, and change user identities and the corresponding user access rights at scale. IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees are in compliance with company policies and regulations.

Many IAM solutions include single sign-on (SSO) and password manager features. For employees, once users authenticate by signing into their accounts or using other multi-factor authentication methods, they are granted limited access to company systems allowed by their user type to complete their typical job functions.

Identity and access management software is different from privileged access management (PAM) software. IAM software is used to authorize, authenticate, and grant specific access to everyday users, such as company employees, while PAM software is used to provide administrative or superusers with granular access to business-critical assets and privileged credentials. IAM software also differs from customer identity and access management (CIAM) software, which provides a company’s customers—opposed to employees—with secured access to customer applications.

To qualify for inclusion in the Best Identity and Access Management (IAM) software category, a product must:

Provision and deprovision user identities
Assign access based on individual role, group membership, and other factors
Enforce user access rights based on permissions
Verify user identity with authentication, which may include multi-factor authentication methods
Integrate with directories that house employee data

Best Identity and Access Management (IAM) Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
225 Listings in Identity and Access Management (IAM) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Access Recertification is a key component of IT infrastructure that controls, manages and audits the security framework. Also, provides a centralized visibility and compliance on roles and responsibil

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure Access Recertification features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Access Recertification is a key component of IT infrastructure that controls, manages and audits the security framework. Also, provides a centralized visibility and compliance on roles and responsibil

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure Access Recertification features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LTS Secure Identity Management allows you to comprehensively and securely manage the complete identity life cycle of users, devices, and things. From identity to device registration, provisioning, syn

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure Identity Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

LTS Secure Identity Management allows you to comprehensively and securely manage the complete identity life cycle of users, devices, and things. From identity to device registration, provisioning, syn

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure Identity Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Merkury enables marketers, media owners, and publishers to own, build, and control a cookie-less Private Identity Graph. Merkury uses an organization’s first-party CRM data and valuable interactions s

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MERKURY features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Merkle
    Year Founded
    1971
    HQ Location
    Columbia, MD
    Twitter
    @MerkleCRM
    58 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,600 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Merkury enables marketers, media owners, and publishers to own, build, and control a cookie-less Private Identity Graph. Merkury uses an organization’s first-party CRM data and valuable interactions s

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
MERKURY features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Merkle
Year Founded
1971
HQ Location
Columbia, MD
Twitter
@MerkleCRM
58 Twitter followers
LinkedIn® Page
www.linkedin.com
6,600 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MidPoint Identity and Access Management System is an open-source identity-management system that provides companies with what they need to unify and synchronize user accounts. Through the intuitive in

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MidPoint Identity and Access Management System features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Evolveum
    HQ Location
    Bratislava, Slovakia
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MidPoint Identity and Access Management System is an open-source identity-management system that provides companies with what they need to unify and synchronize user accounts. Through the intuitive in

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
MidPoint Identity and Access Management System features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Evolveum
HQ Location
Bratislava, Slovakia
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N8 Identity TheAccessHub Suite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
N8 Identity TheAccessHub Suite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Backed by over 120 years of innovation and experience, NEC knows what it takes to change and stay ahead of technology's continuous evolution. It is our capability to leverage decades of award-winning

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NEC Corporation of America features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Irving, Texas
    Twitter
    @NEC
    14,627 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    786 employees on LinkedIn®
    Ownership
    TYO:6701
    Phone
    (214) 262-6000
Product Description
How are these determined?Information
This description is provided by the seller.

Backed by over 120 years of innovation and experience, NEC knows what it takes to change and stay ahead of technology's continuous evolution. It is our capability to leverage decades of award-winning

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NEC Corporation of America features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Irving, Texas
Twitter
@NEC
14,627 Twitter followers
LinkedIn® Page
www.linkedin.com
786 employees on LinkedIn®
Ownership
TYO:6701
Phone
(214) 262-6000
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The easiest and most secure way to manage & monitor least privilege access to internal applications, servers, and databases in any environment.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • odo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odo.io
Product Description
How are these determined?Information
This description is provided by the seller.

The easiest and most secure way to manage & monitor least privilege access to internal applications, servers, and databases in any environment.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
odo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
odo.io
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oleria features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oleria
    Year Founded
    2022
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Oleria features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Oleria
Year Founded
2022
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OmniDefend is a comprehensive Single Sign-On and Identity and Access Management software solution that integrates with various Multifactor Authentication modalities. OmniDefend secures your employees,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OmniDefend features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Softex
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OmniDefend is a comprehensive Single Sign-On and Identity and Access Management software solution that integrates with various Multifactor Authentication modalities. OmniDefend secures your employees,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OmniDefend features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Softex
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Without a comprehensive security framework each system has to maintain its own authentication and authorization scheme, user repository, and security policies. As companies build custom applications o

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenIAM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Openiam
Product Description
How are these determined?Information
This description is provided by the seller.

Without a comprehensive security framework each system has to maintain its own authentication and authorization scheme, user repository, and security policies. As companies build custom applications o

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OpenIAM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Openiam
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OTPLESS stands at the forefront of identity and access management innovation, transforming digital authentication with a user-centric approach. Designed for businesses that prioritize both user engage

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OTPLESS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OTPLESS
    Year Founded
    2021
    HQ Location
    New Delhi
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

OTPLESS stands at the forefront of identity and access management innovation, transforming digital authentication with a user-centric approach. Designed for businesses that prioritize both user engage

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OTPLESS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OTPLESS
Year Founded
2021
HQ Location
New Delhi
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • P0 Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    San Francisco, CA
    Twitter
    @P0Security
    47 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
P0 Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
San Francisco, CA
Twitter
@P0Security
47 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlainID, the Authorization Company, simplifies the complexity businesses face when securely connecting identities to digital assets. Powered by PBAC, PlainID provides a SaaS-based, centralized policy

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PlainID Authorization Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PlainID
    Year Founded
    2014
    HQ Location
    Tel-Aviv, Israel
    Twitter
    @plainID_authZ
    454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    103 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PlainID, the Authorization Company, simplifies the complexity businesses face when securely connecting identities to digital assets. Powered by PBAC, PlainID provides a SaaS-based, centralized policy

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
PlainID Authorization Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
PlainID
Year Founded
2014
HQ Location
Tel-Aviv, Israel
Twitter
@plainID_authZ
454 Twitter followers
LinkedIn® Page
www.linkedin.com
103 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Use a single console to manage access controls, permissions and security across your various Microsoft platforms, including Active Directory (AD), Windows Server, Exchange Server, SharePoint Server an

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quest Security Explorer features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Aliso Viejo, CA
    Twitter
    @Quest
    17,594 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,610 employees on LinkedIn®
    Ownership
    NYSE: DGX
Product Description
How are these determined?Information
This description is provided by the seller.

Use a single console to manage access controls, permissions and security across your various Microsoft platforms, including Active Directory (AD), Windows Server, Exchange Server, SharePoint Server an

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Quest Security Explorer features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1987
HQ Location
Aliso Viejo, CA
Twitter
@Quest
17,594 Twitter followers
LinkedIn® Page
www.linkedin.com
3,610 employees on LinkedIn®
Ownership
NYSE: DGX
Entry Level Price:$1.01
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OKIOK has been developping and delivering world class cybersecurity solutions and services since 1981. RAC/M Identity stands out as an advanced SaaS Identity Governance and Administration (IGA) solu

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RAC/M Identity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okiok
    Year Founded
    1973
Product Description
How are these determined?Information
This description is provided by the seller.

OKIOK has been developping and delivering world class cybersecurity solutions and services since 1981. RAC/M Identity stands out as an advanced SaaS Identity Governance and Administration (IGA) solu

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
RAC/M Identity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Okiok
Year Founded
1973