---
description: Discover the best Identity Management Software for your organisation. Compare top Identity Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Identity Management Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Identity Management Software](https://www.softwareadvice.co.uk/directory/4549/identity-management/software)

# Identity Management Software

Canonical: https://www.softwareadvice.co.uk/directory/4549/identity-management/software

Page: 1 / 10\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=2)

-----

## Products

1. [ManageEngine Password Manager Pro](https://www.softwareadvice.co.uk/software/376425/manageengine-password-manager-pro) — 4.3/5 (23 reviews) — ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores ...
2. [ManageEngine ADManager Plus](https://www.softwareadvice.co.uk/software/361323/manageengine-admanager-plus) — 4.5/5 (84 reviews) — ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD managem...
3. [ManageEngine AD360](https://www.softwareadvice.co.uk/software/370056/manageengine-ad360) — 4.6/5 (34 reviews) — ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and ...
4. [Deel](https://www.softwareadvice.co.uk/software/248344/deel) — 4.8/5 (4266 reviews) — Deel is the only global-first people platform that enables companies to hire, relocate, pay, manage, equip, and suppo...
5. [Netwrix Identity Manager](https://www.softwareadvice.co.uk/software/521562/Netwrix-Usercube) (0 reviews) — Netwrix Usercube is an identity governance and administration (IGA) solution designed to automate, govern, and contro...
6. [Netwrix Directory Manager](https://www.softwareadvice.co.uk/software/521564/Netwrix-GroupID) — 3.0/5 (1 reviews) — Netwrix GroupID is a group and user management software that helps organizations streamline their directory managemen...
7. [Keeper Security](https://www.softwareadvice.co.uk/software/372934/keeper-password-manager) — 4.7/5 (505 reviews) — Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file stora...
8. [Persona](https://www.softwareadvice.co.uk/software/393949/persona) — 4.9/5 (27 reviews) — Persona offers a best-in-class unified identity platform that gives organizations the building blocks they need to de...
9. [FusionAuth](https://www.softwareadvice.co.uk/software/148228/fusionauth) — 4.8/5 (30 reviews) — FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challe...
10. [Bitwarden](https://www.softwareadvice.co.uk/software/182800/bitwarden) — 4.7/5 (214 reviews) — Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store ...
11. [Rippling](https://www.softwareadvice.co.uk/software/410674/rippling) — 4.9/5 (4652 reviews) — Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operatio...
12. [LastPass](https://www.softwareadvice.co.uk/software/140455/lastpass-enterprise) — 4.6/5 (2782 reviews) — LastPass is a cloud-based password manager available on any system or device, ensuring your credentials are protected...
13. [Google Cloud](https://www.softwareadvice.co.uk/software/172144/google-cloud-platform) — 4.7/5 (2264 reviews) — Google Cloud is a suite of cloud computing services that allows businesses to build, deploy, and scale applications. ...
14. [1Password](https://www.softwareadvice.co.uk/software/123595/1password) — 4.7/5 (2123 reviews) — 1Password protects and stores all company secrets beyond SSO such as passwords, security tokens, 2FA codes, documents...
15. [Okta](https://www.softwareadvice.co.uk/software/419181/okta) — 4.7/5 (930 reviews) — Okta is a workforce identity management platform designed to provide centralized access control and user administrati...
16. [Cisco Duo](https://www.softwareadvice.co.uk/software/430527/duo-security) — 4.7/5 (548 reviews) — Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any use...
17. [Jamf Pro](https://www.softwareadvice.co.uk/software/228817/jamf-pro) — 4.7/5 (543 reviews) — Jamf Pro is a cloud-based patch management system which helps network managers and technology professionals monitor p...
18. [Dashlane for Business](https://www.softwareadvice.co.uk/software/76098/dashlane-business) — 4.5/5 (276 reviews) — Dashlane provides intelligent credential security, protecting businesses against the threat of human risk. The Dashla...
19. [JumpCloud Directory Platform](https://www.softwareadvice.co.uk/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (264 reviews) — JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or ...
20. [OpenVPN Access Server](https://www.softwareadvice.co.uk/software/302400/openvpn-access-server) — 4.5/5 (200 reviews) — Free to try and up to 3 connected users - OpenVPN Access Server is a full-featured SSL VPN software solution that int...
21. [LogMeIn Pro](https://www.softwareadvice.co.uk/software/357420/logmein-pro) — 4.4/5 (174 reviews) — LogMeIn Pro by GoTo is a remote access solution that helps organizations connect, monitor and control desktops across...
22. [Auth0](https://www.softwareadvice.co.uk/software/107607/auth0) — 4.7/5 (138 reviews) — Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any applicati...
23. [LogMeOnce](https://www.softwareadvice.co.uk/software/407877/logmeonce) — 4.8/5 (130 reviews) — LogMeOnce is a cloud-based password and identity management solution that enables businesses of all sizes to manage l...
24. [WatchGuard AuthPoint](https://www.softwareadvice.co.uk/software/418986/watchguard-authpoint) — 4.7/5 (104 reviews) — It takes only one compromised credential to damage or even disable an organization seriously. Identity security needs...
25. [GoodAccess](https://www.softwareadvice.co.uk/software/186523/goodaccess) — 4.9/5 (103 reviews) — GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Tru...

-----

Page: 1 / 10\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=2)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Password Management Software](https://www.softwareadvice.co.uk/directory/4585/password-management/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Authentication Software](https://www.softwareadvice.co.uk/directory/4311/authentication/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4549/identity-management/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4549/identity-management/software> |
| en | <https://www.softwareadvice.com/identity-management/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4549/identity-management/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4549/identity-management/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4549/identity-management/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4549/identity-management/software> |
| fr | <https://www.softwareadvice.fr/directory/4549/identity-management/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Identity Management Software","description":"Discover the best Identity Management Software for your organisation. Compare top Identity Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software","about":{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Identity Management Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Best Identity Management Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"ManageEngine Password Manager Pro","position":1,"description":"ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b277f6af-1b08-4a21-a0d9-861949693d0f.jpeg","url":"https://www.softwareadvice.co.uk/software/376425/manageengine-password-manager-pro","@type":"ListItem"},{"name":"ManageEngine ADManager Plus","position":2,"description":"ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD management and reporting tasks with ease. Its all-inclusive reports for diverse AD functionalities play a vital role in data-driven decision-making. ADManager Plus also has risk assessment indicators that monitor your organization's AD environment for potential risks, risk exposure management to view potential attack paths that could leave your privileged entities vulnerable, and access certification campaigns to review user access regularly.\nIt seamlessly integrates with leading ITSM, SIEM, and HCM solutions and other third-party applications using custom APIs to enhance the scalability of IT resource management, improve the efficiency of administrative tasks, and provide consistency while handling enterprise data.\nADManager Plus offers the option to back up your data and restore it when required, preventing data loss.\nIts core features include:\n\nUser provisioning\nManage user identities and access privileges throughout the user's life span in an organization. Create accounts in AD, Microsoft 365, and Google Workspace and carry out other management tasks like password resets, account unlocks, and template-based account updates.\n\nRisk assessment\nIdentify potential security risks of your AD using a risk score indicator. Prompt decisions based on it can help mitigate the identified risks and take the security of the organization up a notch.\n\nRisk exposure management\nVisualize potential attack paths that hackers could exploit to gain access to your AD privileged entities and view required remediation measures to secure them.\n\nAccess certification campaign\nReview the user privileges using periodic audit campaigns to ensure their access is authorized and appropriate. This helps your organization follow the principle of least privilege so that admins can have better control of user access.\n\nReport management\nADManager Plus offers more than 200 prepackaged reports on objects such as users, computers, groups, OUs, and more, plus custom reports with advanced filters, ensuring admins have crucial information at their fingertips. They can carry out tasks by utilizing the in-line management actions available in the report.\n\nWorkflow\nAdmins can define workflow agents like requester, reviewer, approver and executor for every AD management action performed using ADManager Plus. Configure SLAs to ensure the timely execution of tasks by sending frequent notifications, changing priority, and reassigning requests.\n\nDelegation\nEquip non-admin users to execute routine AD administrative tasks by assigning them custom help desk roles, balancing the workload of IT admins.\n\nAutomation\nEliminate manual AD tasks by automating them to be executed at specified time intervals. For critical tasks, implement a business workflow so that the automation is supervised.\n\nOrchestration\nPerform event-driven management actions using predefined templates. Integrate HCM applications with ADManager Plus to activate bidirectional data sync between HCM applications and AD using webhooks.\n\nIntegration\nIntegrate with third-party applications using REST APIs and webhooks. Various ITSM, SIEM, and HCM tools can be integrated with ADManager Plus for centralized management and meeting compliance audit needs.\n\nBackup and recovery\nPrevent and manage data loss by periodically backing up AD, Google Workspace, and Microsoft Entra ID and recovering it when required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/28958cda-088c-4757-b48b-8054d0ef96d9.png","url":"https://www.softwareadvice.co.uk/software/361323/manageengine-admanager-plus","@type":"ListItem"},{"name":"ManageEngine AD360","position":3,"description":"ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and secure user identities, facilitate identity governance, and ensure compliance. It provides in-depth access management for Microsoft Active Directory, M 365, G Suite, and other target systems. Its key capabilities include adaptive authentication, auditing, compliance, identity lifecycle management, actionable reporting, user behavior analytics (UBA), multi-factor authentication (MFA), and single sign-on (SSO). \n\nAutomated A360 facilitates identity lifecycle management by automating routine tasks such as user provisioning, modification, deprovisioning, and other administrative tasks across target systems such as Active Directory, Microsoft 365 and Exchange Server. This helps eliminate errors and redundancies introduced by humans and enhances productivity. \n\nIts actionable reporting and ML powered UBA employs user-behavior analytics, powered by machine learning (ML) algorithms to detect anomalies in user behavior and provides intelligent threat alerts. This provides advanced security insights with precision, and helps prevent false alarms. UBA also provides instant alerts to administrators when unusual logon activity, privilege escalation, and other anomalous behavior are detected. \n\nManageEngine AD360 provides administrators with real-time audit reports and alerts on critical changes made to Active Directory and Azure Active Directory environments. It also allows administrators to monitor and analyze logon activities, lockouts, and password changes to help ensure regulatory compliance. It also provides reports for IT regulatory mandates such GDPR, SOX, PCI, HIPAA, FISMA, and GLBA, to streamline compliance management and prevent regulatory risks.\n \nIts identity analytics and reporting features help users perform risk-based adaptive authentication using identity analytics tools that exploit big data, machine learning (ML), and artificial intelligence (AI) technologies to ensure accuracy and mitigate identity-related risks. Risk-based adaptive authentication is performed using several factors such as user location, IP address, time of previous logon, and device footprint to detect and remove excessive user privileges, monitor privileged accounts, and to detect separation of duty (SOD) violations. \n\nManageEngine AD360 provides contextual multi-factor authentication methods, to extend an additional layer of security and curb identity-related attacks. A wide range of authentication methods including SMS verification, biometric verification, Google authenticator, and RADIUS are supported. Besides MFA, AD360 supports single sign-on (SSO) across SAML based applications. Risk-based adaptive authentication is performed using several factors such as user location, IP address, time of previous logon, and device footprint. This is crucial for detecting and removing excessive user privileges, monitoring privileged accounts, and detecting separation of duty (SOD) violations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6be9101b-2d31-46ec-97f0-29fcb80874e7.jpeg","url":"https://www.softwareadvice.co.uk/software/370056/manageengine-ad360","@type":"ListItem"},{"name":"Deel","position":4,"description":"Deel is the only global-first people platform that enables companies to hire, relocate, pay, manage, equip, and support talent in 150+ countries - all within a single, integrated system.\nDesigned for modern global teams, Deel eliminates the complexity of international workforce operations by combining fully owned infrastructure, built-in compliance, and AI-powered workflows. Unlike providers that rely on third-party payroll processors or in-country partners, Deel owns its payroll rails and operates 250 legal entities worldwide, ensuring faster issue resolution, greater accountability, and consistent service delivery.\nToday, Deel supports 40,000 customers and 1.5 million workers globally, powered by 2,000+ in-house experts across payroll, legal, mobility, immigration, HR, and compliance.\nThe platform is structured around six customer-focused pillars: Hire, Relocate, Pay, Manage, Equip, and Services.\nDeel Hire enables companies to compliantly engage employees and contractors worldwide, including Employer of Record services where Deel acts as the legal employer for international hires.\nDeel Mobility supports global relocation and immigration.\nDeel Payroll allows organizations to run payroll in 130+ countries through a self-run or managed model, with 55+ native payroll engines.\nDeel HR centralizes workforce management, including HRIS, performance, compensation, and workforce planning.\nDeel IT streamlines global device provisioning and security.\nDeel Services provides corporate, HR, immigration, equity, and privacy support.\nDeel integrates with existing HRIS, ERP, and accounting systems, allowing companies to adopt modules as needed while maintaining a unified global data layer.\nWith AI embedded directly into operational workflows - not just chat interfaces - Deel helps teams take action across hiring, payroll, mobility, IT, and reporting. The result is a scalable, compliant infrastructure that supports every worker type across 150+ countries, without borders or third-party dependencies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca638113-5556-4e21-84ef-1cb5086b886d.png","url":"https://www.softwareadvice.co.uk/software/248344/deel","@type":"ListItem"},{"name":"Netwrix Identity Manager","position":5,"description":"Netwrix Usercube is an identity governance and administration (IGA) solution designed to automate, govern, and control enterprise identities. It is a software-as-a-service (SaaS) offering that caters to organizations across various industries seeking to enhance security, compliance, and productivity around user access management.\n\nThe solution ensures that users have the appropriate access to the necessary resources for the right duration. It enhances security and accountability by confirming that only authorized individuals can access the required resources. Netwrix Usercube also empowers business owners, not just IT staff, to grant access to users through a convenient access request portal, streamlining the process.\n\nThe solution secures an organization's data by quickly removing access for employees who have left the company. Additionally, Netwrix Usercube provides automated attestation campaigns and compliance reports that offer a comprehensive view of who has access to what, and why. These features are designed to assist organizations in meeting their compliance requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8541a8c5-03b3-4acd-bf5b-ef09d7acefa0.png","url":"https://www.softwareadvice.co.uk/software/521562/Netwrix-Usercube","@type":"ListItem"},{"name":"Netwrix Directory Manager","position":6,"description":"Netwrix GroupID is a group and user management software that helps organizations streamline their directory management and enhance security. The software caters to businesses of all sizes, from small and medium enterprises to large corporations, across various industries such as healthcare, finance, and government.\n\nNetwrix GroupID automates and delegates group and user management to ensure directories remain current and secure. It allows organizations to streamline group and user management through attestation workflows, which require group owners and users to regularly validate their active status. This helps keep the directory clean and minimizes the attack surface. The software also automatically ensures accurate group memberships as user attributes change, by creating queries that determine group membership based on users' current attributes. This helps organizations untangle nested groups and simplify the creation of group hierarchies, ensuring that changes to parent groups are automatically reflected in child groups.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b4d7e5e0-5901-408b-a9fa-e3d1553fad21.png","url":"https://www.softwareadvice.co.uk/software/521564/Netwrix-GroupID","@type":"ListItem"},{"name":"Keeper Security","position":7,"description":"Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a \"zero-knowledge\" security feature, which allows users only with access to the information being stored on the device and in the Keeper cloud security vault. The solution synchronizes with multiple devices and can be used by multiple users. It allows users to create high-strength random passwords. Users can make password policies and monitor password compliance with Keeper's dashboards, reporting, auditing and notifications.\n\n\nKeeper provides mobile security and data loss prevention and is compatible with desktop computers and mobile devices. Key features include an IT admin console with password security enforcement, user provisioning, delegated administration and active directory integration.\n\n\nThe solution uses 256-bit AES encryption, PBKDF2 key generation, perfect forward secrecy and two-factor authentication. The platform works with businesses of all sizes to integrate security, privacy and internal controls. Pricing is both per month and per year.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f21ce009-05eb-4779-840b-aab7d2d73c79.jpeg","url":"https://www.softwareadvice.co.uk/software/372934/keeper-password-manager","@type":"ListItem"},{"name":"Persona","position":8,"description":"Persona offers a best-in-class unified identity platform that gives organizations the building blocks they need to design and manage fully customizable identity programs – including KYC, KYB, AML, age assurance, and employee verification – across 200+ countries and territories. Persona serves any organization that needs to meet compliance standards, secure their workforce, fight fraud, or build trust by verifying the real identities of people or businesses. Notable customers of Persona include Etsy, LinkedIn, Lyft, Figma, Payoneer, Reddit, Ripple, Square, Travelex, Twilio, and Udemy.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/44ba5639-45ef-44e4-9674-32cf520ce312.jpeg","url":"https://www.softwareadvice.co.uk/software/393949/persona","@type":"ListItem"},{"name":"FusionAuth","position":9,"description":"FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challenges of security, scalability, and developer efficiency. This solution is designed for organizations seeking to enhance their identity management processes while ensuring compliance with stringent regulatory standards such as GDPR and SOC2. By offering a flexible deployment model, FusionAuth allows users to maintain control over their data residency, whether in the cloud, on-premises, or in hybrid environments.\n\nTargeted towards developers and organizations that require robust identity solutions, FusionAuth is particularly beneficial for businesses experiencing rapid growth or those that need to streamline their authentication processes. Its API-first architecture enables organizations to embed identity management directly into their existing workflows, reducing the operational burden associated with traditional identity providers. This capability is especially valuable for companies that wish to eliminate the complexities and costs associated with maintaining homegrown authentication systems.\n\nKey features of FusionAuth include its flexible deployment options, which empower organizations to choose how and where they host their identity management solution. This flexibility is complemented by an API-driven architecture, where every feature is accessible through APIs, allowing for seamless integration and management of identity as part of the overall infrastructure. This approach not only enhances developer velocity but also ensures that organizations can adapt their identity solutions to meet evolving business needs without being locked into a single vendor's cloud.\n\nAdditionally, FusionAuth offers predictable pricing models that help organizations avoid unexpected costs commonly associated with monthly active user (MAU) surges. This transparency in pricing is a significant advantage for businesses looking to scale without incurring excessive expenses. The platform has demonstrated its effectiveness across various industries, with notable success stories highlighting its ability to handle massive traffic surges, reduce operational bottlenecks, and lower engineering burdens.\n\nFor instance, Bilt leveraged FusionAuth to manage high traffic volumes while ensuring compliance with data residency requirements. Similarly, Vatix transitioned from a cumbersome homegrown system to FusionAuth, enabling their Customer Success team to onboard clients quickly and efficiently. UrbanSitter's implementation of FusionAuth significantly reduced their authentication development time, allowing them to focus on core product innovation. These examples illustrate how FusionAuth not only enhances security and compliance but also drives operational efficiency and cost savings for organizations across diverse sectors.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c9a84fb-bd66-457c-b4c3-e15a64673820.png","url":"https://www.softwareadvice.co.uk/software/148228/fusionauth","@type":"ListItem"},{"name":"Bitwarden","position":10,"description":"Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store and share sensitive data with end-to-end encryption.\n\nShare Encrypted Information\n- Share your sensitive information safely and securely with individuals, teams, and enterprises. \n- Transmit encrypted information via a secure link to anyone through your preferred communication channel like text or email.\n\nMake Password Management Convenient\n- Generate and store your strong and unique passwords all in one place.\n- Access account credentials from anywhere, on any device with secure cloud syncing. \n- Bitwarden offers multiple client options to access your password vault including desktop, mobile, browser, web, and CLI.\n- Autofill makes it easy to quickly and securely log in to accounts.\n\nStrengthen Your Security\n- Identify potential security weaknesses like reused, exposed, or weak passwords, and other helpful data security metrics.\n- With exportable event logs, gain transparency into user activity around sensitive data within your organization's vault.\n- Login to your Bitwarden Vault with MFA for an even stronger line of defense.\n\nIntegrate into Your Tech Environment \n- Bitwarden is deployable in both cloud-based and on-premise environments.\n- Our robust Directory Connector and SCIM integration streamline user and group onboarding with automatic account provisioning and de-provisioning. \n- Seamlessly integrate Bitwarden into your existing tech stack with powerful APIs, SSO and directory service integrations, CLI automations, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09a75d31-b4fd-44c1-8b4d-6002c5fa7d76.png","url":"https://www.softwareadvice.co.uk/software/182800/bitwarden","@type":"ListItem"},{"name":"Rippling","position":11,"description":"Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operations. It centralizes employee data and automates tasks, offering features such as workflow studio for automation, reporting analytics, automated policies, and permissions management. Rippling provides specialized suites for various needs: Rippling HR manages the employee lifecycle, Rippling Payroll automates payments and direct deposits, IT tools enhance IT security with identity and device management, and the Finance suite integrates corporate cards, expenses, and accounts payable automatically. It also supports global compliance for onboarding and management across countries. Rippling is an all-in-one platform that offers a wide range of features to streamline HR operations, enhance security measures, automate payroll processes and control company costs. With its focus on scalability, security, automation and cost management, Rippling empowers businesses to optimize their workforce operations, reduce risks and achieve operational efficiency across their organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7ec57690-a46d-4978-83cf-a6f85c097649.png","url":"https://www.softwareadvice.co.uk/software/410674/rippling","@type":"ListItem"},{"name":"LastPass","position":12,"description":"LastPass is a cloud-based password manager available on any system or device, ensuring your credentials are protected, kept private, and always within reach. \n\nSimple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing your most precious data and account logins. And when time is of the essence, LastPass digital wallet ensures that you can transact online securely and with ease. \n\nFrom Main Street to Wall Street, businesses utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for Microsoft Entra ID, Okta, and other IdPs, IAMs, and SIEM tools. With over 100 customizable policies, flexible privileges, detailed reporting, and multifactor and passwordless authentication options, LastPass makes it easy for organizations with numerous logins, increasing security risks, and the need for efficient, scalable solutions to standardize password management company wide.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8583c9db-aff1-4b91-953c-463406291de3.png","url":"https://www.softwareadvice.co.uk/software/140455/lastpass-enterprise","@type":"ListItem"},{"name":"Google Cloud","position":13,"description":"Google Cloud is a suite of cloud computing services that allows businesses to build, deploy, and scale applications. The platform caters to a wide range of industries, such as retail, financial services, healthcare, media, telecommunications, gaming, manufacturing, supply chain, government, education, and automotive.\n\nAt the core of Google Cloud is its technology through which businesses can build, deploy apps, and analyze data. The platform offers Gemini 20 and Google Agentspace. This includes AI agents, AI-enabled search, and NotebookLM for enterprises. Vertex AI is the fully managed AI platform enhanced by Gemini. It provides access to multiple foundation models. This empowers organizations to build and scale generative AI applications. Contact Center AI also delivers virtual agents and conversational AI products like Speech-to-Text to enhance customer service.\n\nGoogle Cloud's infrastructure includes Compute Engine. The platform features Google Kubernetes Engine and Cloud Run for automatically deploying, scaling, and managing containers. Cloud SQL is a fully-managed database service for MySQL, PostgreSQL, and SQL Server. AlloyDB for PostgreSQL allows enterprises to scale workloads and build generative AI apps. Businesses can also leverage BigQuery for analytics at scale, and Looker, a platform for BI data applications and embedded analytics.\n\nFeaturing G-Suite and GCP, Google Cloud provides a set of solutions provides secure storage options, integrated data analytics products and computation options. With its G-Suite platform, users can establish team chats and collaborate on projects through productivity tools like Google Docs, Hangouts, Calendar and Drive. Also, G-Suite provides customization options for Gmail accounts of users.\n\nGCP data centers all around the globe consist of physical assets which include computers, hard drives and other virtual machines that help streamline distribution of resources, which provides redundancy in case of any failure or latency reduction. Providing Global, regional and zonal resources, GCP has managed to bring people into a serverless environment which has eliminated the need for any infrastructure.The AppEngine on GCP helps scale the system to automatically provide the required resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2a3d334e-5a74-46a0-bfa0-70b4915098da.png","url":"https://www.softwareadvice.co.uk/software/172144/google-cloud-platform","@type":"ListItem"},{"name":"1Password","position":14,"description":"1Password protects and stores all company secrets beyond SSO such as passwords, security tokens, 2FA codes, documents, and passkeys (coming soon) to centralize and simplify the sign-in experience. Employees get quick, secure access to any app or service – even those Security or IT may not be aware of – and can safely manage and share everything they need to work together productively. Developers also have access to a collection of features to help secure secrets and speed up workflows throughout the software development life cycle. \n\n1Password also provides admins with more control and visibility as a result of aggregating identity and centralizing credential management. It is easy to deploy and integrates with Azure AD, Okta, OneLogin, Google Workspace and more, so admins can automatically provision employees or configure SSO using the systems they already trust. You can view data breaches, password vulnerabilities, and usage insights in a single dashboard, or send activity data to your SIEM tool via our Events API giving you a complete picture of your security posture. \n\n1Password is secure and private by design. We’re the only password manager that can say with full confidence your data and secrets will remain safe in the unlikely event of a breach. 1Password’s unique Two-Key-Derivation using the combination of an account password and Secret Key (128-bit, machine-generated code) means nobody could decrypt the data in the unlikely case they were able to access it. To keep data safe at rest and in transit, our security approach starts with AES 256-bit encryption, and we use multiple techniques to make sure only you have access to your information. No other password manager uses SRP protocol to prevent anyone from stealing your credentials or reading any non-secret information sent to the server. Lastly, we’ve built our Single Sign-On integration maintaining zero-knowledge architecture and end-to-end encryption using a trusted device model meaning even if your identity provider credentials are compromised, attackers still wouldn’t be able to access your 1Password data. See our security white paper to learn more. \n\nComing summer 2023 we’ll be supporting sign-up and sign in to 1Password using passkeys. In Q2, we are also beginning support for the storing of passkeys within 1Password so that our users can securely access passkeys across platforms in the same place where they keep passwords and other secure information.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d7f48d65-0ebc-4a51-918e-c1cfd1dc4c53.png","url":"https://www.softwareadvice.co.uk/software/123595/1password","@type":"ListItem"},{"name":"Okta","position":15,"description":"Okta is a workforce identity management platform designed to provide centralized access control and user administration for employees and work partners. It supports organizations in securing their workforce while managing access to various business applications and systems.\n\nThe platform includes features such as pre-built integrations to connect with existing business technologies. It offers centralized management of users, groups, and devices through a single interface. Automated onboarding and offboarding capabilities enable administrators to efficiently manage user access with minimal manual effort.\n\nOkta is used by organizations across different industries for identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37d97abb-49dc-4a9f-a027-0925c44e3c6b.png","url":"https://www.softwareadvice.co.uk/software/419181/okta","@type":"ListItem"},{"name":"Cisco Duo","position":16,"description":"Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem.  \n\nDuo verifies users' identities and establishes device trust in any IT and security environment: \n\n- Multi-cloud, hybrid, and on-premises application support \n\n- Diverse mix of operating systems and deep integrations with leading technology providers \n\n- Unique use cases including supporting homegrown and legacy apps, securing third-party devices, and protecting Winlogon and RDP \n\nPaired with deep insights into users’ devices, Duo gives you the policies and control to manage access based on endpoint health or user risk level which can change between authentication attempts. By providing simple, seamless end user and administrator experiences, Duo dramatically reduces your total cost of ownership. \n\nDuo Continuous Identity Security combines Cisco Identity Intelligence with Duo Passport to stop identity-based threats and boost workforce productivity. Cisco Identity Intelligence provides visibility across your identity sources into multi-factor authentication (MFA) usage, admin controls, unmanaged device access, inactive or dormant accounts, excessive permissions, and more.  Duo Passport eliminates MFA fatigue by minimizing authentication requests and friction in trusted scenarios throughout the workday. After login, Duo continually evaluates trust for every access request and doesn’t prompt users again for authentication if the context remains the same. \n\nPrior to granting access to critical resources, Duo verifies users’ identities with strong MFA. Duo passwordless and single sign-on (SSO) build on MFA to verify user identity with authentication tools like biometrics, FIDO2 security keys, and push notifications from the Duo Mobile app. \n\nWhile establishing user trust is essential, you also need to have trust in the devices accessing applications on your network. Duo’s device trust tools deliver visibility into devices, assess their security posture, and continuously verify trust to allow or block access. \n\n- Duo Device Insight inventories every endpoint and provides data on OS, platform, browser and plugin versions, including passcode, screen lock, full disk encryption, and rooted/jailbroken status. Easily search, filter, and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest vulnerabilities. \n\n- Duo Desktop, a native client app for macOS, Windows, and ChromeOS, enables you to enforce corporate device health policies such as checking OS version and patch level, password and firewall status, AV agent enabled, disk encryption, and management status.  \n\n- Self-remediation enables you to block non-compliant devices at the point of authentication and empower users to bring devices back into compliance without contacting IT. Automatically notify users of outdated devices with direct links to update to the latest software version. Provide a grace period before application access is blocked, or block immediately with permissions reinstated once the device has been updated.  \n\n- Duo Trusted Endpoints helps you define and manage trust for every endpoint, whether managed or unmanaged, company-issued, contractor-owned, or personal Bring-Your-Own-Device (BYOD). Create your own inventory of trusted devices with the option to add and remove devices, include a description, set a trust expiration date, and more.  \n\nDuo bundles basic support with every subscription purchase. Duo Quick Start provides 60 days of expert advice from our trusted deployment advisors. With Duo Care, our premium support service, you'll work with a team of Duo experts who will guide you through the life of your subscription to help you maximize the value of your Duo investment as your organization and business needs evolves.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1c054704-dda9-4998-a805-b9fa3169766b.png","url":"https://www.softwareadvice.co.uk/software/430527/duo-security","@type":"ListItem"},{"name":"Jamf Pro","position":17,"description":"Jamf Pro is a cloud-based patch management system which helps network managers and technology professionals monitor patches for applications such as Mac, Google Chrome, Adobe Flash and Microsoft Office. Its key features include automated scanning, network management, remote protection, vulnerability mapping and device recognition.\n\n\nThe application comes with functionality which sends users notifications when new patches are published, evaluates patches and package updates. Team members can use the system’s self-service portal to push a patch and install it automatically. The solution lets users keep all devices up to date by deploying upgrades and tracking the upgrade progress across the environment.\n\n\nJamf Pro enables teams to collect hardware, software and security configuration details from Apple devices and generate custom reports. It is available on a monthly subscription and support is provided via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8ecc6f4b-7c01-4f09-9817-d60c5d3f1347.png","url":"https://www.softwareadvice.co.uk/software/228817/jamf-pro","@type":"ListItem"},{"name":"Dashlane for Business","position":18,"description":"Dashlane provides intelligent credential security, protecting businesses against the threat of human risk. The Dashlane Omnix™ platform unifies credential protection and password management, equipping IT and Security teams with proactive intelligence, real-time response, and protected access to secure every employee. Over 25,000 brands worldwide trust Dashlane for industry-leading innovations, patented zero-knowledge security, and an unmatched user experience\n\n- Industry-leading security standards: Dashlane leads the industry in security quality, using the strongest encryption available and patented technology to protect organizations from breaches.\n - Proactive breach protection: Dashlane continuously scans billions of breach records to ensure no credential-based threat in your organization goes undetected—and we even let you know about exposed credentials of employees who aren't actively using a Dashlane vault. \n- AI-powered phishing protection: Dashlane keeps employees safe as they browse with phishing-resistant autofill and in-context alerts powered by Dashlane AI. Dashlane AI analyzes 80 domain attributes to conduct an in-depth analysis of a potential phishing risk and alert an employee before they enter their credentials.\n - Fast, frictionless access for your entire organization: Dashlane is easy for you to roll out and easy for your employees to use. That means a massive reduction in IT tickets about password management and sharing, saving you time and money.\n - Seamless integration for immediate ROI: Dashlane works with your infrastructure, security stack, and workflow for holistic credential security that you can mass deploy in minutes. Our Confidential SSO & Provisioning are compatible with the most popular IdPs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aa9cf6b9-4e7a-4cc5-9baa-63013c070015.png","url":"https://www.softwareadvice.co.uk/software/76098/dashlane-business","@type":"ListItem"},{"name":"JumpCloud Directory Platform","position":19,"description":"JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provides a centralized identity, which allows administrators to manage system security policies, multi-factor authentication processes, and public SSH keys.\n\n\nProfessionals can utilize its self-service portal to execute commands across multiple servers, control file storage infrastructure, and manage users as an individual or as part of groups. JumpCloud Directory-as-a-Service provides single sign-on functionality to access various applications including Slack, Zendesk, Meraki, GitHub, Dropbox, and more. Additionally, enables managers to monitor employees’ activities across multiple endpoints.\n\n\nJumpCloud Directory-as-a-Service offers an application programming interface (API), which lets businesses integrate the system with several third-party applications such as G-Suite, Azure Active Directory, Workday, and more. Pricing is based on monthly and annual subscriptions and support is extended via FAQs, knowledgebase, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7818866c-4066-4078-ba1a-03c0e105f11d.png","url":"https://www.softwareadvice.co.uk/software/180508/jumpcloud-directory-as-a-service","@type":"ListItem"},{"name":"OpenVPN Access Server","position":20,"description":"Free to try and up to 3 connected users - OpenVPN Access Server is a full-featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/de5e48b8-4dec-4905-9a4e-ee548d072435.png","url":"https://www.softwareadvice.co.uk/software/302400/openvpn-access-server","@type":"ListItem"},{"name":"LogMeIn Pro","position":21,"description":"LogMeIn Pro by GoTo is a remote access solution that helps organizations connect, monitor and control desktops across multiple locations. It enables professionals to access desktop applications, files, folders and business information and handle sharing, screen blanking, keyboard locking, whiteboard drawing and session recording activities.\n\nThe application allows employees to connect multiple monitors to a system using the multi-monitor display functionality and print documents from remote PCs. Features of Pro include collaboration, password management, reporting, SSL security, two-factor authentication and more.  \n\nIt offers various tools including HD video streaming, color quality, file storage, and a high-quality sound system, which lets users remotely stream audio and video files as well as securely store documents in a centralized repository. Pricing is available on a monthly subscription and support is extended via email, documentation, FAQs and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b4249b7f-4ee9-43e5-b25c-c07b7b9c4abc.png","url":"https://www.softwareadvice.co.uk/software/357420/logmein-pro","@type":"ListItem"},{"name":"Auth0","position":22,"description":"Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is a highly customizable product that is as simple as development teams want, and as flexible as they need. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1727a37-7505-40cf-896e-edf3a2a4583e.png","url":"https://www.softwareadvice.co.uk/software/107607/auth0","@type":"ListItem"},{"name":"LogMeOnce","position":23,"description":"LogMeOnce is a cloud-based password and identity management solution that enables businesses of all sizes to manage login credentials and provide secure access to documents, applications and services via a unified portal. The platform allows organizations to protect user accounts against hack attempts and identity theft by scanning the dark web for stolen passwords.\n\nLogMeOnce includes cloud storage encryption capabilities, which allow users to encrypt images, files, documents and other data stored on Google Drive, Dropbox, OneDrive and other storage applications. It offers a host of features such as auto-login, user/group management, Single Sign-On (SSO) and two-factor authentication, geofencing and more. Additionally, enterprises can personalize the interface with custom logos to establish brand identity.\n\nLogMeOnce lets managers generate reports to view and monitor identity and password vulnerabilities through charts and security metrics. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ac803329-fe75-4204-8d68-2ca5d22d8a3b.png","url":"https://www.softwareadvice.co.uk/software/407877/logmeonce","@type":"ListItem"},{"name":"WatchGuard AuthPoint","position":24,"description":"It takes only one compromised credential to damage or even disable an organization seriously. Identity security needs to be the first line of defense against cyberattacks.\nAuthPoint Identity Security provides the security you need to protect identities, assets, accounts, and information. Let your company work confidently and worry-free with easy-to-use, cost-effective, and complete multi-factor authentication and credential management solutions.\nPlus, companies can meet security frameworks, compliance, and cyber insurance requirements related to user authentication and access control.\n\nAuthPoint allows you to enable secure remote access with virtual private networks (VPNs), provide a seamless experience to employees with simple-to-use security technology, and achieve regulatory compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8b01a76d-8f28-4666-9052-a9cd6e6541ab.jpeg","url":"https://www.softwareadvice.co.uk/software/418986/watchguard-authpoint","@type":"ListItem"},{"name":"GoodAccess","position":25,"description":"GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. \n\nBy leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. \n\nOur platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. \n\nGoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments.\n\nStart your 14-day full-featured free trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f55a07d-b749-4b55-9def-de441bfbb8b2.png","url":"https://www.softwareadvice.co.uk/software/186523/goodaccess","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software#itemlist","numberOfItems":25}
</script>
