Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Browser-based PAM solution for secure, recorded access to critical assets
Remote privileged access solution for OT/ICS and cyber-physical systems
Cryptography and IAM consulting services with PKI and certificate mgmt.
Centralized privileged account mgmt platform with access control & auditing
IAM and PAM consulting services and managed identity services platform
Low-code connector platform for extending IGA to disconnected applications
Oracle Access Governance is an identity and access management solution that helps organizations control, monitor, and audit user access privileges across their IT environment.
Identity security platform unifying IAM data with usage-level visibility
IAM platform with visual identity orchestration and low/no-code workflows
IAM solutions provider with Zero Trust security and AI-powered accelerators
Automated IAM platform for centralized access management and compliance
Identity governance platform with automated access reviews and lifecycle mgmt.
Enterprise IAM platform for identity management and access control
Identity and access management platform for authentication and authorization
Cloud-based IGA solution for identity lifecycle mgmt and access governance
Identity security platform with PAM, SSO, MFA, and secrets management
Identity governance and administration solution native to ServiceNow platform
Identity management platform for access governance and Zero Trust security
Unified IAM & PAM platform with identity mgmt, privileged access & password mgmt
Unified identity platform for IGA, PAM, compliance, and access governance
Cloud-native PAM platform for human, machine, and AI identity security
On-premises IGA solution for identity lifecycle and access management
Automates user/group lifecycle mgmt across directories with delegation & self-service
Identity governance platform for access mgmt, compliance & lifecycle automation
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.