Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
LEI issuer & mgmt platform for verified org identity & KYC/KYB workflows
Identity and access management platform for user lifecycle management
Just-in-time privileged access mgmt with session monitoring and audit trails
Digital certificate discovery, monitoring, and expiration management platform
Hardware-based MFA solution for identity authentication and access control
Identity orchestration platform for integrating IAM architecture without app code changes
Identity orchestration platform for managing distributed IAM across hybrid envs
M365 access control & data governance tool for managing permissions & oversharing
User authentication features for ShareFile file sharing platform
Self-service password reset automation for SAP environments
Emergency access management solution for SAP environments with audit trails
SAP segregation of duties conflict analysis and mitigation tool
Cloud-native platform for certificate-based authentication and PKI management
Enterprise PKI platform for certificate management and identity security
Certificate-based device trust for SSO with EAP-TLS authentication
Automated PKI platform with dynamic cert issuance, renewal & revocation
Cloud-based RADIUS server for 802.1X auth with cert lifecycle mgmt & PKI
Passwordless MFA platform for workforce authentication across enterprise systems
Identity and access management solution with MFA and SSO capabilities
Digital signature API service for electronic document signing
Digital identity verification and SSO platform for Indonesia
Converged identity security platform with PAM, IAM, CASB, and MFA capabilities
Converged identity security platform combining PAM, IAM, CASB, and MFA
Cloud-hosted virtual directory server for unified identity data access
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.