Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Secrets management solution for DevOps tools and cloud workloads
Access management platform with SSO, MFA, and conditional access controls
Biometric identity verification system for test-taker authentication
Brokers privileged access with JIT provisioning and credential masking
ABAC-based dynamic authorization for fine-grained access control
AI-powered identity and access governance platform for SaaS environments
ITDR platform for detecting and responding to identity-based threats in SaaS
Permission analysis and supervision tool for Microsoft 365 and file servers
JIT/JEP access mgmt platform replacing standing privileges w/ time-bound access
Alibaba Cloud's full lifecycle SSL certificate management platform for issuance and
Alibaba Cloud IDaaS is a cloud-native Identity and Access Management platform.
AI-powered eKYC solution for real-time identity verification using OCR and facial
Virtual ICT lab management platform for educational institutions and L&D orgs
Biometric MFA server enabling fingerprint & face authentication for applications
IAM solution with adaptive MFA, SSO, and contextual access control
AI-based account takeover detection and response for SaaS collaboration apps
Electronic signature software for signing PDF documents via web interface
Automates least privilege enforcement in cloud via centralized policies & ChatOps
Platform for managing and securing non-human identities across enterprise systems
Automates identity provisioning and deprovisioning across enterprise systems.
Identity access visibility platform for managing permissions across systems
Automates user access provisioning and deprovisioning throughout employee lifecycle
Self-service access request and provisioning platform with JIT access
Automates user access certifications and reviews across systems and resources.
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.