Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
MFA solution with biometric authentication and third-party integrations.
Enforces advanced password policies in Active Directory and other platforms
Automated user provisioning and self-service IT catalog for identity mgmt.
IAM platform with self-service capabilities, MFA, SSO, and mobile access
Managed ITDR solution for 24/7 identity threat detection and response
SSO platform enabling access to multiple apps with one set of credentials
MFA solution providing two-factor authentication for application access
Identity analytics platform for monitoring identity-based risks and access.
Automation platform for identity workflows using bots and playbooks
Cloud and on-premise IGA solution with tiered offerings for identity lifecycle
Identity Governance and Administration platform for identity lifecycle mgmt
Enterprise password manager for secure credential storage and sharing
PAM solution for controlling, auditing, and protecting privileged accounts
Centralized access management platform with SSO, MFA, and risk-based policies
AI-driven identity security platform for human, NHI, and AI identities
IGA solution pre-integrated with Oracle Applications Cloud for ERP access
PAM solution for controlling, monitoring, and securing privileged accounts
Identity lifecycle management platform for employee onboarding and access control
Identity governance platform for managing identities and access entitlements
Automated user access review platform with risk scoring and nested access visibility
IGA solution built natively on ServiceNow platform for identity governance
Cloud-based directory service for centralized user, group, and device mgmt.
Adaptive MFA solution with phishing-resistant auth and contextual policies
Enterprise SSO solution providing secure access to cloud and on-prem apps.
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.