Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
IAM solutions provider offering identity governance, PAM, and Zero Trust access
Cloud-based IDaaS platform for identity and access management
Non-human identity security platform for secrets detection and management
Digital security solutions for IoT connectivity, identity tech, and infrastructure
Password manager with data breach monitoring and identity theft prevention
Password manager with encrypted vault, autofill, and breach monitoring
Cloud-based IAM solution combining access management and governance features
Enterprise IAM suite with identity governance, directory services, and SSO
Self-service password reset for Windows passwords online and offline
IGA solution for managing user identities, access rights, and compliance
Enterprise SSO solution for password management and single authentication access
Telecom network authentication and policy control for 4G/5G networks
MFA integration for Microsoft services including Entra ID, Windows, and RDP
ITDR solution for detecting and responding to identity-based threats
Identity Security Posture Management tool for visibility and risk assessment
SSO solution for centralized authentication and access management
Adaptive access control with MFA, SSO, and risk-based authentication policies
Agentless device verification and trust enforcement for access control
Access management solution with MFA, SSO, passwordless auth & adaptive policies
Passwordless authentication solution using biometrics, security keys, and MFA
MFA solution that verifies user identities with multiple authentication factors
IAM solution with user directory, SSO, MFA, and passwordless authentication
SSO solution that reduces authentication prompts via continuous trust verification
SSO solution with MFA integration for cloud and on-premises applications
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.