CybersecTools API access is now live!Learn More

IAM Tools

Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.

Browse 1,103 iam tools

Identity-first security platform with PAM, ZTNA, and ITDR capabilities

Behavioral biometrics platform for continuous auth and explainable AI threat detection.

Continuous AI-driven behavioral biometric authentication platform.

Secrets management vault with built-in FIPS 140-3 HSM for on-prem/private cloud.

Unified IGA platform with AI-driven automation for access governance and NHI management.

Zero-knowledge proof 2FA using device token & PIN, without revealing credentials.

Cybersecurity firm offering tamper-proof computing, identity devices & data vaults.

PAM solution for privileged access discovery and just-in-time access control.

Vendor-neutral org publishing open standards for OTP & strong auth.

Korean digital trust services provider for e-certificates, e-contracts & PKI.

PAM platform securing privileged accounts across endpoints, servers & cloud.

Decentralized identity verification marketplace with token-settled trust enforcement.

Qualified trust service provider certified under eIDAS 2.0 and NIS2

Virtual smart card for Windows that replaces physical smart cards

Enterprise portal for managing public trust certificates from CAs

FIDO-based passkey authentication solution for passwordless access

Identity governance and administration solution

API-based identity fraud detection using breach & infostealer intelligence

Identity risk scoring & fraud detection using exposed data from dark web sources

Identity intelligence platform for visibility & remediation across AD, PAM & data

BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.

AI-agent-driven IGA platform for continuous entitlement mapping & access governance.

No-Code Identity Governance, easy to deploy with out-of-the-box app support.

Physical object authentication via diamond-dust tags linked to a digital ledger.

IAM Specializations

1103 tools across 7 specializations

IAM Tools FAQ

Common questions about IAM tools, selection guides, pricing, and comparisons.

IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.

Have more questions? Browse our categories or search for specific tools.