Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
IAM solution for auditing and managing data access permissions across environments
AI-powered proxy & anonymous IP detection service for fraud prevention
Policy-driven authorization platform for fine-grained access control
Identity fraud detection software using facial recognition and watchlists
Passwordless biometric authentication using facial recognition and liveness
AI-based identity verification platform with document and biometric authentication
Identity observability platform unifying human, NHI, and AI agent identities
Identity observability platform for AI agents, NHIs, and human identities
Identity protection platform for human & non-human identities across clouds
Identity security platform for access monitoring and threat detection
Open-source IAM solution for SSO, MFA, and identity federation
PKI and certificate lifecycle automation platform for discovery and management
End-to-end IoT identity platform for device cert & key lifecycle mgmt.
Mobile identity verification platform with device binding and digital signing
Identity verification solution binding real-world identity to passkeys
FIDO-certified passwordless MFA authentication with passkey support
Cloud IAM permission rightsizing tool for human and non-human identities
Automates least privilege enforcement across cloud, SaaS, and on-prem identities.
AI-powered user access review automation for identity governance
AI-powered identity security platform for identity breach defense and IAM
AI-powered just-in-time access automation with risk and behavioral analysis
Professional password manager with centralized access management and encryption
Password manager for storing passwords, passkeys, credit cards, and credentials
FIDO2-based 3D facial biometric authentication for laptops, servers & apps
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.