Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Unified secrets management connector for multiple vaults and platforms
Automates certificate lifecycle mgmt with private CA and public CA integration
Federated identity platform for authenticating machine workloads w/o secrets
Identity provider for AI agents with secrets mgmt and access control
Provides secretless remote access to infrastructure with Zero Trust controls
Secrets management platform for storing and managing credentials
Multi-factor authentication service with phone PIN, KBA, and biometric methods
Password manager with passkey creation, storage, and sharing capabilities
Enterprise password manager designed for MSPs to manage client accounts
Enterprise password manager with credential protection and compliance features
Password manager for small businesses with team sharing and access controls
Extended access management solution for identity security and access control
Password manager for storing, generating, and autofilling credentials
Customer IAM platform for managing external identities with SSO and MFA
Workforce IAM platform for identity lifecycle, access governance, and SSO
Audit, threat detection & recovery for hybrid AD, Entra ID & Microsoft 365
Unified admin console for hybrid AD, Entra ID, Intune, Teams & M365 mgmt.
Automates role mining and access control management using ML and identity graphs.
AI-powered identity and access governance platform with digital twin modeling
Self-service password reset and account unlock solution for end users
Enterprise IGA platform for user access governance and automated provisioning
Manages AD, Entra ID & M365 with delegation, automation & least privilege
Zero Trust PAM solution for IT/OT environments with session recording
IGA solution for centralized identity lifecycle & access rights management
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.