IAM Tools
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 1,103 iam tools
FEATURED
USE CASES
Identity-first security platform with PAM, ZTNA, and ITDR capabilities
Behavioral biometrics platform for continuous auth and explainable AI threat detection.
Continuous AI-driven behavioral biometric authentication platform.
Secrets management vault with built-in FIPS 140-3 HSM for on-prem/private cloud.
Unified IGA platform with AI-driven automation for access governance and NHI management.
Zero-knowledge proof 2FA using device token & PIN, without revealing credentials.
Cybersecurity firm offering tamper-proof computing, identity devices & data vaults.
PAM solution for privileged access discovery and just-in-time access control.
Vendor-neutral org publishing open standards for OTP & strong auth.
Korean digital trust services provider for e-certificates, e-contracts & PKI.
PAM platform securing privileged accounts across endpoints, servers & cloud.
Decentralized identity verification marketplace with token-settled trust enforcement.
Qualified trust service provider certified under eIDAS 2.0 and NIS2
Virtual smart card for Windows that replaces physical smart cards
Enterprise portal for managing public trust certificates from CAs
FIDO-based passkey authentication solution for passwordless access
API-based identity fraud detection using breach & infostealer intelligence
Identity risk scoring & fraud detection using exposed data from dark web sources
Identity intelligence platform for visibility & remediation across AD, PAM & data
BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.
AI-agent-driven IGA platform for continuous entitlement mapping & access governance.
No-Code Identity Governance, easy to deploy with out-of-the-box app support.
Physical object authentication via diamond-dust tags linked to a digital ledger.
IAM Specializations
1103 tools across 7 specializations · 54 free, 1049 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.
Multi-Factor Authentication and Single Sign-On
Multi-factor authentication (MFA) and single sign-on (SSO) solutions for secure user authentication and access control.
Password Management
Password manager tools and enterprise password management solutions for secure credential storage and sharing.
Privileged Access Management
Privileged Access Management solutions for securing privileged accounts, managing admin access, and monitoring high-risk user activities.
IAM Tools FAQ
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.