Loading...
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Browse 129 identity governance and administration tools
Managed IAM operations service with Zero Trust framework and IDaaS support
Managed IAM operations service with Zero Trust framework and IDaaS support
Automates IAM application onboarding through data gathering and workflow mgmt.
Automates IAM application onboarding through data gathering and workflow mgmt.
IAM program assessment service evaluating identity and access management maturity
IAM program assessment service evaluating identity and access management maturity
Role mining & access rights analysis tool for IAM governance & compliance
Role mining & access rights analysis tool for IAM governance & compliance
Identity data aggregation & monitoring tool with analytics dashboards
Identity data aggregation & monitoring tool with analytics dashboards
Automates user access reviews & certification for IAM systems via data processing
Automates user access reviews & certification for IAM systems via data processing
Automates IAM application onboarding with templates and workflows.
Automates IAM application onboarding with templates and workflows.
Converged IAM platform with CISO dashboard for identity lifecycle management
Converged IAM platform with CISO dashboard for identity lifecycle management
IGA solution pre-integrated with Oracle Applications Cloud for ERP access
IGA solution pre-integrated with Oracle Applications Cloud for ERP access
Identity lifecycle mgmt solution for workforce provisioning & access control
Identity lifecycle mgmt solution for workforce provisioning & access control
Identity governance platform with 100+ pre-built connectors for unified access mgmt
Identity governance platform with 100+ pre-built connectors for unified access mgmt
Identity lifecycle management platform for employee onboarding and access control
Identity lifecycle management platform for employee onboarding and access control
Identity governance platform for managing identities and access entitlements
Identity governance platform for managing identities and access entitlements
ABAC engine for dynamic least-privilege access based on real-time attributes
ABAC engine for dynamic least-privilege access based on real-time attributes
Automated user access review platform with risk scoring and nested access visibility
Automated user access review platform with risk scoring and nested access visibility
IGA solution built natively on ServiceNow platform for identity governance
IGA solution built natively on ServiceNow platform for identity governance
Cloud-based directory service for centralized user, group, and device mgmt.
Cloud-based directory service for centralized user, group, and device mgmt.
SaaS IGA platform with AI-powered automation for identity lifecycle management
SaaS IGA platform with AI-powered automation for identity lifecycle management
Identity graph visualization for access visibility and risk analysis
Identity graph visualization for access visibility and risk analysis
Identity-based data access governance for humans and machine identities
Identity-based data access governance for humans and machine identities
Governs and secures non-human identities like service accounts, bots, and RPAs
Governs and secures non-human identities like service accounts, bots, and RPAs
Governance and security platform for AI agents and their access to resources
Governance and security platform for AI agents and their access to resources
Manages identity governance for contractors, vendors, and third-party workers.
Manages identity governance for contractors, vendors, and third-party workers.
AI-driven identity governance & access mgmt platform for enterprise IAM
AI-driven identity governance & access mgmt platform for enterprise IAM
Common questions about Identity Governance and Administration tools including selection guides, pricing, and comparisons.
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox