Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Account sharing platform with credential vault and AI agent integration
Enterprise gateway for managing AI agent access to enterprise data via MCP
Identity observability platform for incident response and threat detection
IAM platform providing continuous identity observability across applications
ICAM solution for DDIL environments with authentication and SSO capabilities
Web3-based decentralized identity platform for access control using crypto
Enables secure IdP-initiated SSO with automatic conversion to SP-initiated flows
SCIM-based user provisioning service for automated identity lifecycle management
SCIM provisioning API for automated user lifecycle management from directories
SCIM implementation for automated user provisioning and deprovisioning
Blockchain-based platform for crypto identity verification and compliance
Image-based passwordless authentication and data protection using PQC
Cloud-based MFA and mobile app security solutions with risk analysis
Mobile network-based identity verification and fraud prevention APIs
European digital transaction platform for e-signatures and identity verification
Managed MFA service protecting digital identities with additional authentication
SSL/TLS certificate provider offering DV, OV, EV, and code signing certs
Identity threat detection and response platform for users and NHIs
Identity management platform with biometric auth and multi-region support
IAM solution for financial institutions managing user access and permissions
Mobile identity verification and number intelligence platform for fraud prevention
B2B user management platform with auth, SSO, SCIM, RBAC, and API security
Maps GCP service account key permissions and access for incident response
AI-powered digital employee for automating IAM tasks and orchestration
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.