Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
AI-native identity governance platform for human, non-human, and AI identities
Open source authorization server based on Google Zanzibar for access control
Identity & Access Proxy for authenticating, authorizing & mutating HTTP requests
Fully managed IAM platform with auth APIs, passkeys, and access control
IAM solution for AI agents and agentic AI authentication and authorization
B2B IAM platform with self-service onboarding and granular access control
Customer Identity and Access Management platform with OAuth 2.0 and OIDC
AI-powered unified platform for identity, endpoint security, and compliance
Passwordless workforce IAM with SSO, MFA, and device posture-based access control
Directory-level event monitoring and logging for user identities and resources
MFA solution securing user access to apps, devices, networks, and resources
Policy-driven conditional access control with dynamic authentication requirements
SSO solution for SAML and OIDC apps with MFA and user provisioning
Cloud-based directory platform for identity, access, and device management
Active Directory password monitoring against leaked credential databases
IGA assessment and implementation services for user access governance
IGA solution for managing digital identities and access permissions
Enterprise PAM vault for managing privileged account credentials and sessions
Browser-based VPN-less remote privileged access with RDP/SSH support
Endpoint privilege mgmt & app control for workstations with least privilege
Cloud-native secrets vault for DevOps credentials, API keys, and certificates
Discontinued PAM vault solution, replaced by Secret Server
Service account lifecycle management from discovery to decommissioning
Docker-based SSO solution with SaaS license mgmt and identity lifecycle integration
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Yes. Out of 24 iam tools listed on CybersecTools, 1 are free and 23 are commercial. Free tools work well for small teams, testing, and budget-conscious organizations. Commercial tools typically add enterprise features, dedicated support, and SLA guarantees.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.