Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Authentication & access mgmt solution with SSO, MFA, and password vault
ITDR solution for continuous identity monitoring and threat detection
AD password security suite with breached password protection & self-service
Automates user access reviews and certifications across enterprise systems
Identifies and manages SoD and sensitive access risks across business apps
Automates role management across enterprise apps with SoD analysis and compliance
Automates time-bound privileged access mgmt for SAP, Oracle & business apps
Automates risk-aware user provisioning across enterprise applications
Automates access governance and SoD controls across enterprise applications
Access mgmt platform for nonstandard apps lacking SSO/SCIM support
Manages secure access to social media accounts with SSO, MFA, and access controls
Automates identity lifecycle mgmt for apps without API/SCIM support
Automated credential mgmt & SSO platform for apps without SAML/OIDC support
IAM platform for MFA rollout, session monitoring, and multi-company management
SIM-based identity verification for payment authentication and checkout
SIM-based identity verification for touchless check-in and authentication
Passwordless auth using SIM-based verification to prevent fraud & SIM swaps
Biometric authentication platform with identity verification and passwordless access
Identity verification & passwordless authentication platform with digital wallet
Continuous identity discovery and lifecycle mgmt across hybrid environments
AI-powered platform for automated identity alert investigation and remediation
Identity platform for securing AI agents, humans, and non-human identities
Identity governance & administration platform for managing access & compliance
Identity Security Posture Management platform for identity risk detection
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.