Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Monitors identity activity to identify over-privileged access and unused perms.
Centralized access mgmt platform for self-service requests & governance
NHI security posture mgmt platform for monitoring & mitigating identity risks
Manages non-human identity lifecycle with automated key rotation & governance
Automates NHI remediation via playbooks, auto-rotation, and AI-generated fixes.
Discovers and inventories non-human identities across cloud, on-prem, and AI agents
AI-powered NHI security platform with natural language query interface
Platform for securing non-human identities across cloud, SaaS, and on-prem
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Custom automation workflows for identity exposure data integration into SIEM/SOAR
User behavior and access analytics platform with AI-powered insights
Manages third-party vendor privileged access with Zero Trust controls
Manages secure access to shared mobile devices with fast authentication & SSO
Enterprise access management with SSO, MFA, and passwordless authentication
Passwordless authentication solution using FIDO technology and biometrics
PAM platform for MSPs to manage privileged access across client infrastructure
Enterprise password mgmt platform with zero-trust & zero-knowledge architecture
Zero-trust remote access gateway for desktops, servers, databases, and web apps
Enforces least privilege & JIT access on Windows, macOS & Linux endpoints.
Enterprise password management with zero-trust and zero-knowledge encryption
Data access governance platform enforcing least-privilege across data platforms
AI-powered identity security platform for real-time access decisions & auditing
PAM solution providing just-in-time access with Zero Standing Privilege
Identity management solution for automated provisioning and access control
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.