Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Identity Governance and Administration

Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.

Explore 36 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
ManageEngine Identity360 Logo

Cloud-based IAM platform that provides centralized identity management

0
ManageEngine ADManager Plus Logo

Manage, secure, and report on AD, Microsoft 365, and Google Workspace environments

0
ManageEngine ADAudit Plus Logo

Active Directory auditing and reporting solution that monitors AD changes

0
ManageEngine AD360 Logo

Integrated IAM suite for Active Directory and hybrid identity management

0
XYPRO XYGATE Identity Connector (XIC) Logo

Identity connector for HPE NonStop servers with SailPoint and CyberArk

0
SecurEnds Identity Governance & Administration Logo

Identity governance platform for access reviews, compliance, and provisioning

0
Radiant Logic RadiantOne Logo

Identity data platform that unifies, observes, and acts on identity data

0
Netwrix Directory Manager Logo

Automates user and group lifecycle management across Active Directory and Entra ID

0
Monokee Logo

Monokee is an identity orchestration and access management platform that provides visual, low-code tools for designing authentication workflows, managing digital identities, and implementing secure access controls across multiple domains.

0
SAP Cloud Identity Access Governance Logo

A cloud-based identity and access management solution that provides access governance, compliance monitoring, and risk management for hybrid environments.

0
Pathlock Logo

Pathlock is an identity security platform that provides compliance-focused governance, access management, and continuous controls monitoring across enterprise applications with particular emphasis on ERP systems.

0
Oasis Security - NHI Security Cloud Logo

A Non-Human Identity Management platform that provides discovery, security, and lifecycle management for machine identities across hybrid cloud environments.

0
Clutch Security Logo

A platform that discovers, manages and secures non-human identities like service accounts, API keys and secrets across enterprise environments.

0
Token Security Logo

A cloud-based platform that discovers, monitors, and manages non-human identities and their associated credentials across cloud infrastructure.

0
AWS IAM Access Analyzer Logo

AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.

0
Ploy Logo

A platform that helps companies automate the management of their SaaS identities and applications, providing visibility, security, and compliance across the organization's SaaS ecosystem.

0
Enumerate IAM Permissions Logo

A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.

0
Policy Sentry IAM Least Privilege Policy Generator Logo

Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.

0
AWS Lambda - IAM Access Key Disabler Logo

A Lambda function that automatically disables AWS IAM User Access Keys after a specified time period to reduce security risks from aging credentials.

0
Aaia Logo

Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.

0
IAM Zero Logo

IAM Zero detects identity and access management issues and automatically suggests least-privilege policies by analyzing application errors and access patterns in cloud environments.

0
IAMSpy Logo

IAMSpy is a library that uses the Z3 prover to analyze AWS IAM policies and query whether specific actions are allowed or denied.

0
Repokid Logo

Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.

0
AWS IAM Identity Center Logo

Centralized workforce identity management for AWS applications.

0

Identity Governance and Administration Tools - FAQ

Common questions about Identity Governance and Administration tools including selection guides, pricing, and comparisons.

Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.

Have more questions? Browse our categories or search for specific tools.