Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Identity and access management platform for AI agents accessing internal tools
Authentication and user management platform with pre-built UI components
Zero trust identity platform for securing workloads with dynamic credentials
Real-time identity network for detecting synthetic identity fraud
AI-powered IAM agents for identity security and access management automation
Identity knowledge graph for access governance and IAM decision-making
Cloud-native platform for secure third-party access mgmt with monitoring
AI-powered PAM solution with behavioral analysis and session monitoring
Authentication software for Windows and Linux with alternative login methods
PAM solution for managing & securing remote access to critical systems
MFA solution for on-premises and hybrid cloud corporate environments
Passwordless authentication for healthcare using device-bound biometrics.
Digital identity verification platform for global eIDs and digital wallets
Runtime security platform for NHIs, secrets, and AI agents with secretless access
Passkey-based authentication for one-click checkout with device binding
AI-powered fraud detection using adaptive ML for identity verification
Network-based fraud intelligence platform for detecting repeat fraudsters
Digital identity verification platform using verifiable credentials & wallets
2FA protection for GitHub using virtual phone numbers and biometrics
Generates random email addresses to mask real email and protect identity
Passwordless authentication platform with location-based security and ITDR
Identity risk engine that analyzes user behavior and correlates security data
Unified identity infrastructure for AI agents with federated identity & access
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.