Loading...
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Browse 918 iam tools
Biometric physical access control using palm and facial recognition for buildings.
Automated password rotation & credential mgmt for IoT/OT/IIoT devices.
JIT privileged access management for human, NHI, and AI identities.
PAM platform replacing standing access with JIT, least-privilege controls.
PAM vendor acquired by SailPoint; products no longer for sale.
IaC-based access management via a Terraform provider for IAM at scale.
AI-driven IGA platform managing access for humans, services, and AI agents.
IAM platform for continuous access governance across human and machine identities.
Iris-based biometric identity verification using near-infrared imaging and encryption.
Contactless palm biometric identity verification using vein & surface scanning.
AI-based facial recognition for identity verification and access control.
Multi-modal biometric identity verification suite for fraud prevention.
SaaS ITDR platform for detecting & responding to identity threats.
SaaS identity security tool detecting & responding to token compromise attacks.
SaaS excessive privilege detection and remediation platform.
AI assistant for identity governance with NL queries, automation & behavior analysis.
Cloud-native PAM platform for securing and monitoring privileged accounts.
5-week IAM modernization program for 5 apps at a flat $5K fee.
CIEM platform for multicloud identity visibility, monitoring, and remediation.
Converged IAM/IGA/PAM/CIEM platform for hybrid and multi-cloud identity security.
IAM platform for unified identity visibility across on-prem, hybrid & cloud.
IGA platform automating access certifications, compliance, and identity governance.
Identity automation platform for access mgmt, workflows, and behavior monitoring.
Trustless auth API using zero-knowledge proofs to eliminate password storage.
918 tools across 7 specializations · 51 free, 867 commercial
Certificate Lifecycle Management
Certificate lifecycle management tools for automated SSL/TLS certificate provisioning, renewal, and PKI management.
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Identity Threat Detection and Response
Identity Threat Detection and Response (ITDR) solutions for detecting identity-based attacks, credential theft, and compromised accounts in real-time.
Common questions about IAM tools, selection guides, pricing, and comparisons.
IAM (Identity and Access Management) is the broad category covering all identity-related security. PAM (Privileged Access Management) specifically secures high-risk accounts like admin, root, and service accounts with session recording, just-in-time access, and credential vaulting. IGA (Identity Governance and Administration) focuses on access lifecycle management, certification reviews, and ensuring users only have the access they need.
If you have admin accounts, shared credentials, service accounts, or any users with elevated privileges, you need PAM. Standard IAM handles authentication and basic authorization, but PAM adds critical controls for privileged access: credential vaulting, session recording, just-in-time elevation, and break-glass procedures. Compromised privileged accounts are involved in the majority of serious breaches.
ITDR is an emerging category that detects attacks targeting identity infrastructure: credential theft, Kerberoasting, pass-the-hash, MFA bypass, and Active Directory attacks. While IAM and PAM focus on prevention (controlling who can access what), ITDR focuses on detection and response when identity-based attacks are in progress. It fills the gap between identity management and security operations.
Passwordless authentication (FIDO2, passkeys, biometrics) eliminates the password entirely, removing the most commonly attacked credential. Traditional MFA adds a second factor but still relies on passwords. Passwordless is more secure and provides better user experience, but requires compatible infrastructure. Start with FIDO2/passkey support for high-risk users and gradually expand across the organization.
Based on user ratings and community engagement on CybersecTools, the top-rated IAM tools are:
Identity Verification
Identity verification services and tools for digital identity proofing, KYC compliance, and fraud prevention.