Best Identity and Access Management (IAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity and access management (IAM) software helps companies protect their systems from unauthorized access or misuse by only allowing authenticated, authorized users (typically employees, based on job roles) to access specific, protected company systems and data. IT administrators leverage the software to quickly provision, deprovision, and change user identities and the corresponding user access rights at scale. IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees are in compliance with company policies and regulations.

Many IAM solutions include single sign-on (SSO) and password manager features. For employees, once users authenticate by signing into their accounts or using other multi-factor authentication methods, they are granted limited access to company systems allowed by their user type to complete their typical job functions.

Identity and access management software is different from privileged access management (PAM) software. IAM software is used to authorize, authenticate, and grant specific access to everyday users, such as company employees, while PAM software is used to provide administrative or superusers with granular access to business-critical assets and privileged credentials. IAM software also differs from customer identity and access management (CIAM) software, which provides a company’s customers—opposed to employees—with secured access to customer applications.

To qualify for inclusion in the Best Identity and Access Management (IAM) software category, a product must:

Provision and deprovision user identities
Assign access based on individual role, group membership, and other factors
Enforce user access rights based on permissions
Verify user identity with authentication, which may include multi-factor authentication methods
Integrate with directories that house employee data

Best Identity and Access Management (IAM) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
223 Listings in Identity and Access Management (IAM) Available
(3,087)4.5 out of 5
Optimized for quick response
4th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:$9.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a device management tool that facilitates user directory management, agent installation, policy configuration, and SSO integration.
    • Users frequently mention the ease of use, comprehensive documentation, and excellent customer support as standout features of JumpCloud.
    • Users experienced limitations in MDM management for Android devices, lack of support for older versions of Linux, and issues with reporting and device management.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    755
    Device Management
    538
    Integrations
    388
    Security
    352
    Easy Integrations
    331
    Cons
    Missing Features
    262
    Improvement Needed
    220
    Limited Features
    146
    Poor User Interface
    106
    Expensive
    102
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Tracking
    Average: 8.7
    9.0
    User provisioning
    Average: 9.0
    8.2
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    37,068 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    828 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a device management tool that facilitates user directory management, agent installation, policy configuration, and SSO integration.
  • Users frequently mention the ease of use, comprehensive documentation, and excellent customer support as standout features of JumpCloud.
  • Users experienced limitations in MDM management for Android devices, lack of support for older versions of Linux, and issues with reporting and device management.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
755
Device Management
538
Integrations
388
Security
352
Easy Integrations
331
Cons
Missing Features
262
Improvement Needed
220
Limited Features
146
Poor User Interface
106
Expensive
102
JumpCloud features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.5
Tracking
Average: 8.7
9.0
User provisioning
Average: 9.0
8.2
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
37,068 Twitter followers
LinkedIn® Page
www.linkedin.com
828 employees on LinkedIn®
(789)4.5 out of 5
5th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    193
    Security
    185
    Identity Management
    128
    Single Sign-On
    115
    SSO (Single Sign-On)
    99
    Cons
    Expensive
    65
    Complexity
    46
    Authentication Issues
    42
    Integration Issues
    41
    Difficult Learning
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Tracking
    Average: 8.7
    9.0
    User provisioning
    Average: 9.0
    8.5
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,056,360 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
193
Security
185
Identity Management
128
Single Sign-On
115
SSO (Single Sign-On)
99
Cons
Expensive
65
Complexity
46
Authentication Issues
42
Integration Issues
41
Difficult Learning
40
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.1
8.8
Tracking
Average: 8.7
9.0
User provisioning
Average: 9.0
8.5
On-premises solution
Average: 8.3
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,056,360 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(892)4.5 out of 5
1st Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Okta
Save to My Lists
Entry Level Price:$2 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    108
    Security
    67
    Authentication
    51
    Easy Access
    51
    Single Sign-On
    47
    Cons
    Authentication Issues
    40
    Frequent Authentication
    23
    Login Issues
    23
    Password Issues
    14
    Complex Setup
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    9.1
    Tracking
    Average: 8.7
    9.3
    User provisioning
    Average: 9.0
    9.1
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,268 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 41% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
108
Security
67
Authentication
51
Easy Access
51
Single Sign-On
47
Cons
Authentication Issues
40
Frequent Authentication
23
Login Issues
23
Password Issues
14
Complex Setup
9
Okta features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
9.1
Tracking
Average: 8.7
9.3
User provisioning
Average: 9.0
9.1
On-premises solution
Average: 8.3
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,268 Twitter followers
LinkedIn® Page
www.linkedin.com
8,122 employees on LinkedIn®
(7,216)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Rippling
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Autom

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 62% Mid-Market
    • 35% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Rippling is a platform that provides access to paystubs, benefits, and time off requests, and assists in managing work-related tasks.
    • Reviewers frequently mention the ease of use, the intuitiveness of the platform, and the convenience of having all necessary tools in one place.
    • Users mentioned some issues with the navigation being unintuitive, the mobile app lacking full functionality, and occasional difficulties in finding specific features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rippling Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3,934
    Intuitive
    3,016
    Simple
    2,473
    User Interface
    2,164
    Easy Access
    2,121
    Cons
    Missing Features
    746
    Not User-Friendly
    458
    Limited Features
    442
    Poor Interface Design
    416
    Learning Curve
    404
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rippling features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Tracking
    Average: 8.7
    9.3
    User provisioning
    Average: 9.0
    9.2
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rippling
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @Rippling
    9,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,863 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Autom

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 62% Mid-Market
  • 35% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Rippling is a platform that provides access to paystubs, benefits, and time off requests, and assists in managing work-related tasks.
  • Reviewers frequently mention the ease of use, the intuitiveness of the platform, and the convenience of having all necessary tools in one place.
  • Users mentioned some issues with the navigation being unintuitive, the mobile app lacking full functionality, and occasional difficulties in finding specific features.
Rippling Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3,934
Intuitive
3,016
Simple
2,473
User Interface
2,164
Easy Access
2,121
Cons
Missing Features
746
Not User-Friendly
458
Limited Features
442
Poor Interface Design
416
Learning Curve
404
Rippling features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
9.2
Tracking
Average: 8.7
9.3
User provisioning
Average: 9.0
9.2
On-premises solution
Average: 8.3
Seller Details
Seller
Rippling
Company Website
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@Rippling
9,139 Twitter followers
LinkedIn® Page
www.linkedin.com
3,863 employees on LinkedIn®
(3,015)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    794
    Features
    364
    Customizability
    344
    Useful
    336
    Customization
    318
    Cons
    Learning Curve
    249
    Complexity
    236
    Expensive
    214
    Missing Features
    214
    Limitations
    201
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    8.6
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    583,857 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 36% Enterprise
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
794
Features
364
Customizability
344
Useful
336
Customization
318
Cons
Learning Curve
249
Complexity
236
Expensive
214
Missing Features
214
Limitations
201
Salesforce Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.1
8.8
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
8.6
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
583,857 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
(394)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    89
    Authentication Ease
    60
    Security
    59
    Authentication
    54
    Easy Access
    45
    Cons
    Authentication Issues
    32
    Access Limitations
    24
    Login Issues
    21
    Notification Issues
    15
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Tracking
    Average: 8.7
    9.4
    User provisioning
    Average: 9.0
    9.4
    On-premises solution
    Average: 8.3
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • User Sentiment
    How are these determined?Information
    These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
    • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
    • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
    • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,457 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
89
Authentication Ease
60
Security
59
Authentication
54
Easy Access
45
Cons
Authentication Issues
32
Access Limitations
24
Login Issues
21
Notification Issues
15
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.1
9.4
Tracking
Average: 8.7
9.4
User provisioning
Average: 9.0
9.4
On-premises solution
Average: 8.3
User Sentiment
How are these determined?Information
These insights are written by G2's Market Research team, using actual user reviews for Cisco Duo, left between September 2020 and April 2022.
  • Reviewers of Duo Security frequently cite the push notifications as being a major benefit of this software, but some wish the push notifications were faster.
  • Reviewers mention that they use Duo security to improve the security of their login process, but sometimes the login request times out too quickly.
  • Reviewers of Duo Security mention that they like how easy setup and integration is for end users.
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,457 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
(27)4.6 out of 5
View top Consulting Services for Oracle Identity Cloud Service
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs.

    Users
    No information available
    Industries
    • Automotive
    Market Segment
    • 48% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Oracle Identity Cloud Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Cloud Services
    4
    Customer Support
    4
    Easy Integrations
    4
    Features
    3
    Cons
    Lack of Expertise
    4
    Slow Performance
    4
    Expensive
    3
    Poor User Interface
    3
    Needs Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.1
    8.1
    Tracking
    Average: 8.7
    8.8
    User provisioning
    Average: 9.0
    8.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    824,546 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199,405 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs.

Users
No information available
Industries
  • Automotive
Market Segment
  • 48% Mid-Market
  • 41% Enterprise
Oracle Identity Cloud Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Cloud Services
4
Customer Support
4
Easy Integrations
4
Features
3
Cons
Lack of Expertise
4
Slow Performance
4
Expensive
3
Poor User Interface
3
Needs Improvement
2
Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.1
8.1
Tracking
Average: 8.7
8.8
User provisioning
Average: 9.0
8.7
On-premises solution
Average: 8.3
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
824,546 Twitter followers
LinkedIn® Page
www.linkedin.com
199,405 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permiss

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 28% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Identity and Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    7
    Ease of Use
    6
    Easy Management
    6
    Policy Management
    4
    Security
    4
    Cons
    Missing Features
    4
    Learning Curve
    3
    Poor User Interface
    3
    Access Permissions
    2
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    8.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,232,996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permiss

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 28% Small-Business
AWS Identity and Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
7
Ease of Use
6
Easy Management
6
Policy Management
4
Security
4
Cons
Missing Features
4
Learning Curve
3
Poor User Interface
3
Access Permissions
2
Complexity
2
AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
8.0
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
8.4
On-premises solution
Average: 8.3
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,232,996 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(16)4.5 out of 5
View top Consulting Services for Google Cloud Identity
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Security
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,631,734 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 25% Small-Business
Google Cloud Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Security
1
Cons
Expensive
1
Google Cloud Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.1
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,631,734 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a us

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Vertrified Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    10
    Ease of Use
    7
    Easy Access
    4
    Intuitive
    3
    Simple
    3
    Cons
    Expensive
    2
    Internet Dependency
    1
    Limited Customization
    1
    Missing Data
    1
    Poor User Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Vertrified Access features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    9.8
    Tracking
    Average: 8.7
    9.8
    User provisioning
    Average: 9.0
    9.8
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,232,996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a us

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 29% Enterprise
AWS Vertrified Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
10
Ease of Use
7
Easy Access
4
Intuitive
3
Simple
3
Cons
Expensive
2
Internet Dependency
1
Limited Customization
1
Missing Data
1
Poor User Interface
1
AWS Vertrified Access features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.1
9.8
Tracking
Average: 8.7
9.8
User provisioning
Average: 9.0
9.8
On-premises solution
Average: 8.3
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,232,996 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(139)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Enterprise
    • 38% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify is an identity access management tool that provides secure user authentication and integration capabilities for managing customer and workforce identities.
    • Users like the tool's advanced authentication methods, including multi-factor authentication and single sign-on, its ease of use, and its ability to automate access allocation and revocation, enhancing security and simplifying user access.
    • Reviewers mentioned that the initial setup and configuration can be complex and time-consuming, especially for those new to identity management systems, and that the platform requires some learning and can be expensive.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Ease of Use
    24
    Authentication
    23
    Identity Management
    20
    Features
    19
    Cons
    Expensive
    12
    Difficult Learning
    11
    Complexity
    10
    Complex Setup
    10
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.4
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    8.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    710,706 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Enterprise
  • 38% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify is an identity access management tool that provides secure user authentication and integration capabilities for managing customer and workforce identities.
  • Users like the tool's advanced authentication methods, including multi-factor authentication and single sign-on, its ease of use, and its ability to automate access allocation and revocation, enhancing security and simplifying user access.
  • Reviewers mentioned that the initial setup and configuration can be complex and time-consuming, especially for those new to identity management systems, and that the platform requires some learning and can be expensive.
IBM Verify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Ease of Use
24
Authentication
23
Identity Management
20
Features
19
Cons
Expensive
12
Difficult Learning
11
Complexity
10
Complex Setup
10
Cost
9
IBM Verify features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.1
8.4
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
8.4
On-premises solution
Average: 8.3
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
710,706 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
(30)4.7 out of 5
15th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Cloud Management
    7
    Customer Support
    7
    Insights
    7
    Monitoring
    6
    Cons
    Limited Features
    5
    Feature Limitations
    3
    Improvement Needed
    3
    Lack of Features
    3
    Missing Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Tracking
    Average: 8.7
    9.3
    User provisioning
    Average: 9.0
    8.9
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,070 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Mid-Market
  • 43% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Cloud Management
7
Customer Support
7
Insights
7
Monitoring
6
Cons
Limited Features
5
Feature Limitations
3
Improvement Needed
3
Lack of Features
3
Missing Features
3
Tenable Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.1
8.9
Tracking
Average: 8.7
9.3
User provisioning
Average: 9.0
8.9
On-premises solution
Average: 8.3
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,070 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(1,362)4.7 out of 5
14th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for 1Password
Save to My Lists
100% off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

    Users
    • Software Engineer
    • Owner
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    98
    Security
    76
    Intuitive
    32
    Secure Sharing
    31
    Password Management
    30
    Cons
    Password Management
    41
    Authentication Issues
    25
    Login Issues
    21
    Process Complexity
    20
    Autofill Issues
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Tracking
    Average: 8.7
    10.0
    User provisioning
    Average: 9.0
    10.0
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    141,746 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,449 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure

Users
  • Software Engineer
  • Owner
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
98
Security
76
Intuitive
32
Secure Sharing
31
Password Management
30
Cons
Password Management
41
Authentication Issues
25
Login Issues
21
Process Complexity
20
Autofill Issues
18
1Password features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.6
Tracking
Average: 8.7
10.0
User provisioning
Average: 9.0
10.0
On-premises solution
Average: 8.3
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
141,746 Twitter followers
LinkedIn® Page
www.linkedin.com
2,449 employees on LinkedIn®
(64)4.8 out of 5
Optimized for quick response
6th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

    Users
    • CTO
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Descope Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Customer Support
    35
    Easy Integrations
    27
    Implementation Ease
    23
    Authentication
    20
    Cons
    Missing Features
    12
    Poor Documentation
    8
    Difficult Learning
    5
    Lack of Information
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Descope features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Tracking
    Average: 8.7
    9.8
    User provisioning
    Average: 9.0
    10.0
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Descope
    Company Website
    Year Founded
    2022
    HQ Location
    Los Altos, California
    Twitter
    @descopeinc
    483 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

Users
  • CTO
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 13% Mid-Market
Descope Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Customer Support
35
Easy Integrations
27
Implementation Ease
23
Authentication
20
Cons
Missing Features
12
Poor Documentation
8
Difficult Learning
5
Lack of Information
5
Learning Curve
5
Descope features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.1
9.6
Tracking
Average: 8.7
9.8
User provisioning
Average: 9.0
10.0
On-premises solution
Average: 8.3
Seller Details
Seller
Descope
Company Website
Year Founded
2022
HQ Location
Los Altos, California
Twitter
@descopeinc
483 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(48)4.4 out of 5
View top Consulting Services for Google Cloud Identity & Access Management (IAM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fine-grained access control and visibility for centrally managing cloud resources.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 25% Small-Business
    • 15% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity & Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Access Control
    4
    Easy Integrations
    3
    Flexibility
    3
    Admin Control
    2
    Cons
    Access Control
    1
    Complexity
    1
    Complex Setup
    1
    Difficulty Locating
    1
    Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Tracking
    Average: 8.7
    8.6
    User provisioning
    Average: 9.0
    7.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,631,734 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Fine-grained access control and visibility for centrally managing cloud resources.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 25% Small-Business
  • 15% Enterprise
Google Cloud Identity & Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Access Control
4
Easy Integrations
3
Flexibility
3
Admin Control
2
Cons
Access Control
1
Complexity
1
Complex Setup
1
Difficulty Locating
1
Documentation
1
Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.8
Tracking
Average: 8.7
8.6
User provisioning
Average: 9.0
7.7
On-premises solution
Average: 8.3
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,631,734 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG

Learn More About Identity and Access Management (IAM) Software

What is Identity and Access Management (IAM) Software?

Companies use identity and access management (IAM) software to both enforce their security controls regarding who has access to corporate assets and to promote worker productivity with ease of access to the tools they need to do their jobs. IAM software achieves this by allowing only authorized and authenticated users, such as employees, contractors, and devices, to access corporate resources at their appropriate permission level based on predetermined policy-based controls. 

Using IAM software, company administrators can quickly provision, deprovision, or change user identities and access rights to corporate assets at scale. Each user is granted the right level of access permissions based on their user or group membership type. This makes it easier for security teams to manage who has access to what accounts at scale, and for end users to quickly gain access to the tools they need to do their jobs instead of waiting for their individual accounts to be provisioned one by one. For example, a newly promoted departmental leader at a company may need permissions to fully access the proprietary data stored within an application. This can easily be granted to them due to their management group membership, while a junior-level employee would not need that kind of granular access, so they would only be permissioned to view non sensitive data stored within the application. IAM software also tracks user activity, enabling administrators to confirm that users are accessing corporate assets in compliance with company policies.

Using IAM software and utilizing policy-based controls to enforce least privilege strategies, companies can protect against unauthorized access from both external actors like hackers and non permissioned internal users (insider threats) who have insufficient access level permissions. IAM software is used as an important component of a company’s zero-trust, least-privilege security model, where all users’ identities are verified prior to granting access to corporate resources. This is different from prior security models that enforced perimeter security where once a user is inside the corporate network, they are granted free access and movement across the network, and not required to be authenticated again to use other applications.

What Does IAM Stand For?

IAM, sometimes also listed as IdAM, stands for identity and access management. IAM software is sometimes also referred to as workforce identity or employee identity management. Other acronyms related to IAM include CIAM for customer identity and access management (CIAM) software which is used for customer-related identity management. Similarly, for government-related identity products, the acronym ICAM stands for Identity, credential, and access management. Another acronym, IDaaS, stands for identity as a service.

What are the Common Features of Identity and Access Management (IAM) Software?

The following are some core features within IAM software:

Authentication: IAM providers offer multi-factor authentication (MFA) methods for users to prove their identity prior to being granted access to corporate resources. MFA requires more than a single authentication factor, such as only a username and password. Authentication factors can include one-time passcodes (OTPs), software tokens, mobile-push, hardware tokens, and more. More advanced authentication methods include biometric authentication and passwordless authentication. 

More recently, IAM providers are utilizing risk-based authentication (RBA) methods, also known as contextual authentication, intelligent MFA, or adaptive MFA, which analyzes real-time information about users, such as their IP addresses, devices, and behaviors to continually verify their identity. 

Identity lifecycle management or user provisioning and deprovisioning: IAM software providers offer administrators the ability to manage the lifecycle of an identity—from quickly provisioning to deprovisioning, along with user changes including attributes, roles, permissions, and other entitlements. Some IAM providers also offer a universal directory.

Directory: IAM providers will either integrate with existing directory providers or offer a universal directory service.

Single sign-on (SSO): IAM software provides SSO functionality to enable end users to access their business applications all in one place and requiring them to authenticate once.

User activity monitoring: IAM software enables administrators to track user activity, including anomalous activity. This kind of auditing is to ensure compliance with secure access control policies. IAM solutions often provide standard reports for this.

What are the Benefits of Identity and Access Management (IAM) Software?

Security: The main benefit of implementing identity and access manager software is for improved security. IAM software manages access governance, allowing only verified, authorized, and permissioned users to access company assets. This helps mitigate risks from external hackers or insider threats.

Productivity or enabling the workforce: In addition to improved security, companies that deploy IAM software to streamline the login experience, may lead to productivity gains with users. Having a simple to use security product with SSO requiring only one login and that also organizes the user’s corporate applications and accounts all in one place can save the user time and frustration. 

Regulatory compliance: Many global governmental or industry regulations require companies to have security controls to be in place. Identity management is a major component of a well-rounded information security program.

Who Uses Identity and Access Management (IAM) Software?

Information security (infosec) professionals: Infosec professionals use IAM software as a foundational component of their security program.

IT Administrators: IT admins may be responsible for managing IAM software, especially as it relates to provisioning and deprovisioning users.

End users and devices: End users such as employees or contractors use IAM software in their day-to-day work activities to access corporate assets needed to do their jobs. Devices such as internet of things (IoT) devices require the validity of their identity in order to access corporate resources, including other IoT devices.

What are the Alternatives to Identity and Access Management (IAM) Software?

Alternatives to IAM solutions can replace this type of software, either partially or completely include:

Single sign-on (SSO) software: SSO software, which is a component of a complete IAM software solution, is an authentication tool that allows users to sign into multiple applications or databases with a single set of credentials. SSO software will not have identity governance and user lifecycle management features that an IAM solution would provide.

Multi-factor authentication (MFA) software: MFA, which is a component of a complete IAM software solution, is used to have users prove their identity in two or more ways before granting them access privileges to corporate accounts. There are many types of authentication factors above the standard single factor of login credentials like usernames and passwords, including something the user has like a mobile device or security token, something the user is, such as a scan of their faceprint or fingerprint, or somewhere the user is, like their geographical location and IP address. Newer forms of MFA include risk-based authentication and passwordless authentication.

Password manager software: Password manager software, or password management software, stores a user's individual passwords through either an encrypted vault downloaded to a user’s computer or mobile device, or digitally through browser plugins or extensions. The passwords stored in this software are managed by the user, not by a corporate administrator.

Software Related to Identity and Access Management (IAM) Software

Related solutions that can be used together with IAM software include many types of identity management software:

Customer identity and access management (CIAM) software: CIAM software is similar to IAM software, but used for customer identities instead of workforce identities like employees, contractors, and corporate devices. 

Privileged access management (PAM) software: PAM software helps companies protect the most critical IT resources by ensuring the credentials of their privileged accounts, such as admin accounts are only accessed by those with proper permissions to do so. When users access these privileged accounts, they must check in and check out and are often monitored during the time they are using the privileged account. PAM solutions are used in conjunction with IAM software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. 

User provisioning and governance tools: User provisioning and governance tools enable companies to manage user account identities throughout their lifecycle, including provisioning and deprovisioning. These solutions are often deployed on-premises, but many tools are offering cloud-based solutions, as well. 

Cloud directory services software: Similar to user provisioning and governance tools, cloud directory services software enables companies to manage user identities throughout their lifecycle, including provisioning and deprovisioning, in a cloud-deployed manner. Companies use these tools as they transition away from traditional on premises or locally operating identity management software to cloud services and SaaS applications. 

Challenges with Identity and Access Management (IAM) Software

Identity management solutions and IAM systems can come with their own set of challenges. 

Policy and group management: Managing corporate access policies and group management is a company policy-related issue, not necessarily a technical one. It can get overwhelming for IAM administrators when companies have undefined or even conflicting policies as to which users have access to what resources. Administrators may be asked by leadership to provide users with much higher levels of access than their policy or group access control would normally allow, thus introducing risks into the environment.

Identity for cloud vs. on-premises applications: Depending on the company’s technology stack, businesses may have a mix of both on-premises and cloud-based applications and resources. Companies must ensure that their IAM solution has connectors to the types of systems they need support for, especially for hybrid IT environments.

Insufficient MFA methods: It is important that the MFA component of the identity program is strong to prevent unauthorized use which can lead to data breaches. Many IAM providers are moving away from less secure MFA methods, such as email one-time-passcodes to stronger authentication methods like risk-based authentication or contextual authentication.

How to Buy Identity and Access Management (IAM) Software

Requirements Gathering (RFI/RFP) for Identity and Access Management (IAM) Software

When gathering and prioritizing the company's requirements, it is important to consider the following factors.

Ease for end users: In order for IAM software to be effective, end users have to actually use it. The IAM solution must be easy to use by the end user and become part of their everyday routine. 

Authentication methods: Are there limitations on the types of authentication factors that the company’s employees, contractors, and devices can use? For example, employees may be able to use authentication methods such as hardware tokens and biometrics, while temporary contractors might rely on in-app mobile pushes or OTPs sent via email, SMS, or phone. Additionally, if employees in a manufacturing facility or healthcare unit cannot carry a mobile phone with them, authentication factors requiring a mobile device may not be suitable.

Regional considerations: Is the company global? Does the IAM solution need to support multiple languages, use cases, and adhere to local data protection regulations? Businesses must ensure the IAM provider can accommodate the company’s geographic and regional-based needs.

Integrations: Companies should determine which integrations are important to them. The most critical integration would likely be the user directory solution, such as an HR system, if a directory is not provided by or being used within the IAM solution.

Timeline: The company must decide how quickly they need to implement the solution.

Level of support: Buyers should know if they require high-quality support or if they prefer implementing the solution in house.

Compare Identity and Access Management (IAM) Software Products

Create a long list

There are many providers of IAM software. The best way to begin narrowing the search for products that would work well for the company would be to start by company segment size, such as small, medium, or enterprise-size businesses. By visiting the Identity and Access Management (IAM) software page on G2.com, buyers can filter solutions by market segment using the left-hand filter radio buttons.

Create a short list

After looking through IAM solutions for particular company size, buyers should ensure it meets the authentication and regional needs. If a specific language is a requirement, buyers can filter solutions by language by visiting the Identity and Access Management (IAM) software page on G2.com. For other requirements, such as how easy it is to use, the “Easiest to use” section of the Identity and Access Management (IAM) software page on G2 helps compare options. Users can further narrow the selection by reading user reviews, checking the product’s ranking on the G2 Grid® report for the Identity and Access Management (IAM) software category, and reading other related IAM-related resources.

Conduct demos

At each demo, buyers must be sure to ask the same questions and use case scenarios to best evaluate each product. Potential buyers can contact many vendors directly on g2.com to request demos by selecting the “Get a quote” button. 

Selection of Identity and Access Management (IAM) Software

Choose a selection team

The selection team should include the day-to-day administrator of this product, who is likely an information security or related cybersecurity professional or an IT administrator professional. Companies may also consider having someone from HR join the selection committee to provide context regarding new hire onboarding and employee offboarding, as it relates to the user provisioning or deprovisioning aspect of IAM software. And lastly, it is important to include a typical day-to-day end user to ensure that the end user experience is easy to use and can be widely adopted by the workforce.

Negotiation

When negotiating the contract, buyers must consider pricing, implementation, and support. Typically longer length contracts and larger license counts can improve price discounting. 

Final decision

The final decision maker should likely be the day-to-day administrator of the solution, likely an information security professional or an IT administrator professional, with input from other stakeholders on the selection team. Prior to purchasing an IAM solution, buyers should check if they can get a trial period to test with a small number of users before going all in on the product. If the tool is well received by end users and administrators, businesses can feel more confident in their purchase.