IAM
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.
Explore 293 curated cybersecurity tools, with 15,216 visitors searching for solutions
FEATURED
RELATED TASKS
Identity access visibility platform for managing permissions across systems
Identity access visibility platform for managing permissions across systems
Detects and mitigates separation of duties violations across platforms.
Detects and mitigates separation of duties violations across platforms.
Automates user access provisioning and deprovisioning throughout employee lifecycle
Automates user access provisioning and deprovisioning throughout employee lifecycle
Self-service access request and provisioning platform with JIT access
Self-service access request and provisioning platform with JIT access
Automates user access certifications and reviews across systems and resources.
Automates user access certifications and reviews across systems and resources.
Monitors identity activity to identify over-privileged access and unused perms.
Monitors identity activity to identify over-privileged access and unused perms.
Centralized access mgmt platform for self-service requests & governance
Centralized access mgmt platform for self-service requests & governance
GenAI-powered identity security platform for least privilege access management
GenAI-powered identity security platform for least privilege access management
NHI security posture mgmt platform for monitoring & mitigating identity risks
NHI security posture mgmt platform for monitoring & mitigating identity risks
Manages non-human identity lifecycle with automated key rotation & governance
Manages non-human identity lifecycle with automated key rotation & governance
Real-time threat detection & response for non-human identities (NHIs)
Real-time threat detection & response for non-human identities (NHIs)
Automates NHI remediation via playbooks, auto-rotation, and AI-generated fixes.
Automates NHI remediation via playbooks, auto-rotation, and AI-generated fixes.
Discovers and inventories non-human identities across cloud, on-prem, and AI agents
Discovers and inventories non-human identities across cloud, on-prem, and AI agents
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Cloud Infrastructure Entitlement Management (CIEM) for managing cloud permissions
Cloud Infrastructure Entitlement Management (CIEM) for managing cloud permissions
Custom automation workflows for identity exposure data integration into SIEM/SOAR
Custom automation workflows for identity exposure data integration into SIEM/SOAR
User behavior and access analytics platform with AI-powered insights
User behavior and access analytics platform with AI-powered insights
Manages third-party vendor privileged access with Zero Trust controls
Manages third-party vendor privileged access with Zero Trust controls
Manages secure access to shared mobile devices with fast authentication & SSO
Manages secure access to shared mobile devices with fast authentication & SSO
Enterprise access management with SSO, MFA, and passwordless authentication
Enterprise access management with SSO, MFA, and passwordless authentication
Passwordless authentication solution using FIDO technology and biometrics
Passwordless authentication solution using FIDO technology and biometrics
PAM platform for MSPs to manage privileged access across client infrastructure
PAM platform for MSPs to manage privileged access across client infrastructure
Enterprise password mgmt platform with zero-trust & zero-knowledge architecture
Enterprise password mgmt platform with zero-trust & zero-knowledge architecture
IAM Tools - FAQ
Common questions about IAM tools including selection guides, pricing, and comparisons.
Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.