Identity Governance and Administration

Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.

Explore 128 curated cybersecurity tools, with 15,426 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

GuidePoint Identity Governance & Administration Logo

IGA assessment and implementation services for user access governance

0
ID North Identity Governance and Administration (IGA) Logo

IGA solution for managing digital identities and access permissions

0
Avatier Lifecycle Management Logo

AI-powered identity lifecycle mgmt with self-service access requests & provisioning

0
Avatier Identity Enforcer Logo

Automated user provisioning and self-service IT catalog for identity mgmt.

0
Avatier Identity Anywhere 2025 Summer Edition Logo

IAM platform with self-service capabilities, MFA, SSO, and mobile access

0
Avatier Compliance Auditor Access Governance Logo

Access governance software for access certification and AD group management

0
Avatier Identity Management Logo

AI-powered identity management platform with Docker container framework

0
Avatier Identity Anywhere Group Management Logo

Self-service AD group management platform with workflow automation

0
Gurucul Identity Analytics (IdA) Logo

Identity analytics platform for monitoring identity-based risks and access.

0
READI Connector Studio Logo

Low-code platform for building custom identity connectors for IGA systems

0
Readibots Bot Studio Logo

Automation platform for identity workflows using bots and playbooks

0
Readibots Access Studio Logo

Identity admin platform with virtualized control plane for access mgmt

0
READI Access Studio Logo

Identity automation platform with access policy, workflow, and connector mgmt

0
Tuebora Identity Governance and Administration Logo

Cloud and on-premise IGA solution with tiered offerings for identity lifecycle

0
Tuebora Workload Identity Management Agent Logo

AI-powered workload identity mgmt for non-human identities governance

0
Tuebora Access Requests Logo

AI-powered access request management agent for IGA with RLHF capabilities

0
Tuebora Segregation of Duties Logo

IGA agent for detecting and managing segregation of duties conflicts

0
Tuebora Reviews Agent Logo

AI-powered access review automation using RLHF for IGA compliance

0
Tuebora JML Agent Logo

IGA agent for automating JML workflows with AI-driven provisioning

0
Tuebora Application Onboarding Agent Logo

AI agent for onboarding apps into IGA systems using natural language

0
Soffid ID Risk & Compliance (IRC) Logo

Identity risk mgmt & compliance solution with automated audits & access controls

0
Soffid Soffid IGA Logo

Identity Governance and Administration platform for identity lifecycle mgmt

0
Soffid Identity Analytics Logo

BI analytics module for IAM systems providing dashboards for identity risk mgmt

0
ILANTUS IAM Maturity and Gap Assessment Logo

IAM advisory and consulting services for maturity assessment and gap analysis

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Identity Governance and Administration Tools - FAQ

Common questions about Identity Governance and Administration tools including selection guides, pricing, and comparisons.

Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.

Have more questions? Browse our categories or search for specific tools.