Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security. Task: Least Privilege
Browse 133 cybersecurity tools
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Enterprise PAM platform using Shamir Secret Sharing to eliminate credential exposure.
Enterprise password manager with E2E encryption, SSO, directory sync & self-host.
AD permissions audit tool for analyzing ACLs, access rights, and security principals.
NHI security platform replacing secrets with identity-based, just-in-time access.
AI-driven IAM risk mitigation with automated least privilege enforcement & JIT access.
Analyzes identities & entitlements to score risk and surface access insights.
PAM platform securing privileged accounts across endpoints, servers & cloud.
Agentless PAM platform enforcing Zero Standing Privilege via JIT access policies.
Cloud-based secrets management platform for teams and automated workflows.
Gateway that injects credentials in-transit so runtimes never hold secrets.
External authorization engine for enterprise apps with RBAC/ABAC policy support.
Agentless ISPM platform for identity risk visibility, attack paths & compliance.
Credential-free authentication via QR scan with zero credential storage.
Gateway governing engineer & AI agent access to production infra.
Unified identity data platform for discovery, observability, and governance.
IAM & IGA platform with AI for lifecycle mgmt, access governance & compliance.
JIT access mgmt platform enforcing least privilege across cloud & SaaS.
Agentic access mgmt platform for human & AI identity governance.
SaaS IAM platform covering IGA, SSO, MFA, and CIAM for all identity types.
Centralized authorization platform for fine-grained permissions at scale.
AI-native platform for identity vulnerability discovery across human, NHI & AI agents.
AI-driven IGA platform for access governance, lifecycle mgmt, and identity risk.
AI-powered IGA platform for access rights review, risk scoring & SoD.