Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
No-code platform for orchestrating identity verification and onboarding flows
Digital identity proofing solution for KYC/AML compliant customer onboarding
PAM services and managed solutions for securing privileged accounts
IGA solution with managed services for access governance and compliance
Managed CIEM service for multi-cloud permission & entitlement management
Managed CIAM service for securing customer digital access and experiences
AD, Entra ID, Exchange & M365 management with automation & delegation
Identity attack path management platform for hybrid environments
Identity threat detection and response platform for cloud infrastructure
Unified identity layer for infrastructure access across humans, machines, and AI
Identity-based access control and security platform for AI infrastructure
Identity-first security platform with encryption, IAM, and PAM capabilities
Decentralized identity platform using SSI and verifiable credentials
Password manager with AES-256 encryption and biometric authentication
Real-time access analytics and threat detection for PAM with audit trails
PAM platform with JIT access, zero standing privileges, and policy-driven control
Passwordless MFA+SSO solution with phishing-resistant authentication
FIDO-based authentication SDK with biometric, PIN, and pattern verification
Policy-based endpoint privilege mgmt granting apps elevated rights w/o user admin
IGA platform for SaaS app discovery, access mgmt, and compliance automation
Voice biometric authentication for workforce identity assurance in call centers
Multi-tenant IAM platform for MSPs and CSPs with SSO, MFA, and RBAC/ABAC
Identity data synchronization tool for cloud and on-premises systems
Identity verification platform for KYC/KYB compliance and user authentication
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.