Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Omnichannel authentication platform for passwordless client verification
Electronic signature app using DNIe 3.0 and NFC technology on Android devices
Electronic signature service compliant with eIDAS regulation
PAM solution with Zero Trust for managing privileged access and credentials
Passwordless authentication solution using decentralized identity wallet
Adaptive identity proofing solution for account security and fraud prevention
Adaptive authentication platform with risk-based dynamic user challenges
Identity threat detection platform for account fraud and ATO prevention
Identity threat detection and response platform for SaaS, cloud, and on-prem
Digital identity wallet for decentralized citizen identity in financial services
Facial biometrics solution for digital identity verification and onboarding
PSD3-compliant hardware token supporting FIDO2 authentication standards
Cloud identity threat detection and response platform for human and non-human IDs
Open-source identity provider with SSO, MFA, and application proxy capabilities
Multi-modal biometric authentication platform for physical access control
IAM resilience platform for Okta compliance, backup, and recovery
Verifies identities via bank, utility, and government portal logins in 195 countries
Real-time IP analysis for detecting VPNs, proxies, Tor, and network fraud signals
Real-time AML screening for individuals and companies against global watchlists
Biometric re-authentication for returning users using liveness and face matching
Non-human IAM platform for hybrid IT environments with secretless authentication
Identity mgmt for on-prem systems replacing static credentials w/ ephemeral IDs
Facial biometric authentication system for passwordless access and identity verification
Identity graph platform for attributing cloud & CI/CD actions to specific identities
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.