Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Bank account verification for digital banks, credit unions, and regional banks
Unified fraud, compliance, and risk decisioning platform with identity-based AI
Frictionless mobile phone verification via MSISDN matching without user input
SMS-based identity verification and MFA using one-time passcodes (OTPs)
Multi-channel user verification API supporting SMS, email, and messaging apps
Automates identity lifecycle mgmt for joiner-mover-leaver workflows
Identity and application visibility platform for access risk management
Self-service access request automation platform with Slack integration
Webinar on digital identity protection and ITDR solutions
Centralized mgmt console for multiple WALLIX PAM deployments
Browser-based PAM extension for secure web app access with session recording
MFA solution for privileged access control with Zero Trust approach
Secure remote access solution for third-party vendors without VPN or shared passwords
Identity and access governance platform for access rights management
Enterprise password vault for centralized credential storage and sharing
Centralized PAM solution for controlling privileged access to IT/OT systems
SaaS platform for PAM, identity management, and remote access control
Passwordless authentication platform with biometrics and AI-based threat detection
Contactless 4-fingerprint biometric authentication using smartphone cameras
Passwordless authentication platform using mobile biometrics for enterprise
AI-driven identity threat protection using behavioral analysis & risk signaling
Customer and B2B identity management platform with CIAM and IAM capabilities
Workforce IAM solution with SSO, MFA, and centralized access management
CIAM platform for customer identity verification, access management, and SSO
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.