Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Identity security platform mapping attack paths and misconfigurations
MFA solution using visual cryptography with credential delegation capabilities
Automates just-in-time access requests with least privilege policies
Detects help desk impersonation & social engineering attacks in real time
Tamper-resistant secure element chip for IoT device identity & crypto ops
Managed PKI-as-a-Service for IoT device cert generation & lifecycle mgmt
Secure device identity provisioning service for chips during manufacturing
Prevents fake account creation using device, email, and behavioral analysis
Device risk analysis for detecting fraudulent, headless, and spoofed devices
Password manager with autofill for credentials, payment info, and forms
Password manager with passkey creation, storage, and management capabilities
Online password generator that creates secure, random passwords
Browser extension that securely saves passwords and auto-logs into websites.
Password manager with encrypted sharing for individuals and businesses
Manages NHI and AI agent lifecycle from provisioning to decommissioning
NHI and AI agent security platform with discovery, governance, and ITDR
IAM ITDR platform for AI agents and non-human identities
Secures AI agents and non-human identities with discovery and governance.
Prevents account takeover attacks through predictive detection and real-time protection.
Centralized identity data platform unifying human & non-human identities
Secures AI agents by managing their non-human identities and secrets
NHI discovery, lifecycle mgmt & threat detection platform with NHIDR engine
Customer identity and access management platform with authentication features
Real-time digital intelligence for identity verification and fraud detection
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.