
YeshID is a commercial Identity Governance and Administration tool developed by YeshID. Security professionals most commonly compare it with Orca Cloud Infrastructure Entitlement Management. All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to YeshID, including their key features and shared capabilities.
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
AI-driven IGA platform for access governance, lifecycle mgmt, and identity risk.
Shares 8 capabilities with YeshID: Workflow, Least Privilege, RBAC, Inventory +4 more
Agentic access mgmt platform for human & AI identity governance.
Shares 7 capabilities with YeshID: Workflow, Least Privilege, RBAC, Permissions +3 more
AI-driven IAM risk mitigation with automated least privilege enforcement & JIT access.
Shares 6 capabilities with YeshID: Workflow, Least Privilege, RBAC, Permissions +2 more
SaaS IAM platform covering IGA, SSO, MFA, and CIAM for all identity types.
Shares 6 capabilities with YeshID: Least Privilege, RBAC, Permissions, MFA +2 more
Analyzes identities & entitlements to score risk and surface access insights.
Shares 4 capabilities with YeshID: Least Privilege, RBAC, Inventory, Non-Human Identity
Fine-grained authorization service for apps and APIs with ~1ms latency.
Shares 3 capabilities with YeshID: Least Privilege, Policy, RBAC
AD permissions audit tool for analyzing ACLs, access rights, and security principals.
Shares 3 capabilities with YeshID: Least Privilege, RBAC, Permissions
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
AI-driven IGA platform for access governance, lifecycle mgmt, and identity risk.
Agentic access mgmt platform for human & AI identity governance.
AI-driven IAM risk mitigation with automated least privilege enforcement & JIT access.
SaaS IAM platform covering IGA, SSO, MFA, and CIAM for all identity types.
Analyzes identities & entitlements to score risk and surface access insights.
Fine-grained authorization service for apps and APIs with ~1ms latency.
AD permissions audit tool for analyzing ACLs, access rights, and security principals.
Centralized authorization platform for fine-grained permissions at scale.
Unified identity data platform for discovery, observability, and governance.
Data access governance platform enforcing least-privilege across data platforms
Platform for managing and securing non-human identities across enterprise systems
Identity Governance and Administration platform for identity lifecycle mgmt
Cloud and on-premise IGA solution with tiered offerings for identity lifecycle
Manages AD, Entra ID & M365 with delegation, automation & least privilege
Audits and manages user permissions to reduce security risks.
Managed IAM service for user access control across enterprise resources.
Automates user access reviews with real-time visibility and audit-ready logging.
Unified RBAC & IGA platform for SaaS/cloud entitlement risk management.
ML-driven access governance for entitlement visibility & outlier detection.
IAM platform managing identity lifecycle, access requests, and certification.
Enterprise IAM platform with IGA, PAM, and Zero Trust access controls.
Federated IAM gateway for secure, compliant B2B partner access mgmt.
Automates user access provisioning & de-provisioning across apps.
SaaS excessive privilege detection and remediation platform.
AI-driven IGA platform managing access for humans, services, and AI agents.
Data access observability tool for monitoring user permissions and usage.
Cloud entitlement mgmt platform for managing & right-sizing cloud permissions.
Platform for standardizing authorization policies across software systems.
Lightweight IGA platform for cloud identity lifecycle & access governance.
AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.
IAM Zero detects identity and access management issues and automatically suggests least-privilege policies by analyzing application errors and access patterns in cloud environments.
A simple drop-in library for managing users, permissions, and groups in your application.
Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.
Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.
Identity management platform for access governance and Zero Trust security
IAM platform with visual identity orchestration and low/no-code workflows
Identity security platform unifying IAM data with usage-level visibility
Oracle Access Governance is an identity and access management solution that helps organizations control, monitor, and audit user access privileges across their IT environment.
Identity data platform that unifies, observes, and acts on identity data
Identity Security Posture Management platform for cloud identity protection
Identity management solution for automated provisioning and access control
Manages non-human identity lifecycle with automated key rotation & governance
Centralized access mgmt platform for self-service requests & governance
Monitors identity activity to identify over-privileged access and unused perms.
Self-service access request and provisioning platform with JIT access
Identity access visibility platform for managing permissions across systems
Automates identity provisioning and deprovisioning across enterprise systems.
Common questions security professionals ask when evaluating alternatives and competitors to YeshID.
The most popular alternatives to YeshID include Orca Cloud Infrastructure Entitlement Management, Lumos Autonomous Identity Platform, Cakewalk, Opti Risk Mitigation, and Memority Identity Factory 360°. These Identity Governance and Administration tools offer similar capabilities and are frequently compared by security professionals evaluating their options.