---
description: Page 8 - Discover the best Identity Management Software for your organisation. Compare top Identity Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 8 - Best Identity Management Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Identity Management Software](https://www.softwareadvice.co.uk/directory/4549/identity-management/software) > [Page 8](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8)

# Identity Management Software

Canonical: https://www.softwareadvice.co.uk/directory/4549/identity-management/software

Page: 8 / 10\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=7)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=9)

-----

## Products

1. [Appsian Security Platform](https://www.softwareadvice.co.uk/software/182143/appsian-security-platform) (0 reviews) — Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentic...
2. [Evidian](https://www.softwareadvice.co.uk/software/136849/evidian) (0 reviews) — Evidian is a cloud-based and on-premise identity governance and access management solution designed to help enterpris...
3. [Efecte IGA](https://www.softwareadvice.co.uk/software/192772/efecte-identity-governance-and-administration) (0 reviews) — Efecte IAM helps enterprises automate identity and access management operations via a unified portal. The built-in pr...
4. [swIDch Auth SDK](https://www.softwareadvice.co.uk/software/320674/otac) (0 reviews) — swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOT...
5. [GroupID](https://www.softwareadvice.co.uk/software/266697/groupid) (0 reviews) — GroupID by Imanami is a Microsoft Gold Partner and recognized as the best Active Directory management tool in identit...
6. [Prove ID](https://www.softwareadvice.co.uk/software/322148/prove-id) (0 reviews) — Prove ID is an end-to-end ID verification \&amp; management tool for online businesses. It enables remote parties to a...
7. [Akku (Cloud Access Security Broker)](https://www.softwareadvice.co.uk/software/178249/akku-cloud-access-security-broker) (0 reviews) — Akku is a cloud-based identity and access management solution that helps businesses protect and manage enterprise dat...
8. [IDHub](https://www.softwareadvice.co.uk/software/328462/idhub) (0 reviews) — IDHub is a fully customizable, flexible, and user-friendly IAM solution. We know managing a highly technical IAM syst...
9. [Cognito](https://www.softwareadvice.co.uk/software/324642/cognito) (0 reviews) — Cognito Flow makes it easy to verify your customers' identities, around the world, seamlessly. Stay compliant with KY...
10. [TechIDManager](https://www.softwareadvice.co.uk/software/340042/techidmanager) (0 reviews) — TechIDManager is a cloud-based and on-premise password and identity management solution that enables MSPs of all size...
11. [IBM Security zSecure](https://www.softwareadvice.co.uk/software/350402/ibm-security-zsecure) (0 reviews) — IBM Security zSecure is a suite of products designed to simplify mainframe security administration, automate auditing...
12. [ManageEngine Free Active Directory Tools](https://www.softwareadvice.co.uk/software/361467/manageengine-free-active-directory-tools) (0 reviews) — ManageEngine Free Active Directory Tools is a zero-cost solution that has a user-friendly GUI to help expedite common...
13. [Daito](https://www.softwareadvice.co.uk/software/366113/daito) (0 reviews) — Daito is a web-based 2FA authenticator that simplifies protecting shared accounts with 2FA while enabling you to secu...
14. [Keystash](https://www.softwareadvice.co.uk/software/366883/keystash) (0 reviews) — Keystash is a Linux user access and SSH key management solution. Creating and managing Linux user accounts, privilege...
15. [VeriFinger SDK](https://www.softwareadvice.co.uk/software/311417/verifinger-sdk) (0 reviews) — VeriFinger SDK is a powerful, multiplatform and fully scalable fingerprint identification library. It can be used as ...
16. [SafeNet Trusted Access](https://www.softwareadvice.co.uk/software/446053/safenet-trusted-access) (0 reviews) — SafeNet Trusted Access: Provide simple, secure access to all your apps with authentication everywhere. Cloud-based ap...
17. [Cloud Identity](https://www.softwareadvice.co.uk/software/369911/cloud-identity) (0 reviews) — Cloud Identity is the most reliable cloud multi-biometric platform in the world, to validate the identity of people; ...
18. [walt.id Identity Infrastructure](https://www.softwareadvice.co.uk/software/322610/ssi-kit) (0 reviews) — We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and busines...
19. [OLOID](https://www.softwareadvice.co.uk/software/377837/oloid) (0 reviews) — OLOID is an authentication platform that provides secure access for frontline workers. It offers a range of multi-fac...
20. [Kycaid](https://www.softwareadvice.co.uk/software/357929/kycaid) (0 reviews) — Kycaid is a one-stop-shop compliance platform that is aimed to help businesses of all sizes and industries reduce ris...
21. [IGA Toolkit](https://www.softwareadvice.co.uk/software/252578/iga-toolkit) (0 reviews) — IGA Toolkit is a cloud-based identity management solution that allows organizations to manage user identity and secur...
22. [Securden Unified PAM](https://www.softwareadvice.co.uk/software/359258/privileged-account-manager) (0 reviews) — Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, shar...
23. [CloudEagle](https://www.softwareadvice.co.uk/software/422972/cloudeagle) (0 reviews) — CloudEagle.ai is an AI-powered platform built to simplify how enterprises manage SaaS applications and identities. By...
24. [Socure](https://www.softwareadvice.co.uk/software/269179/socure) (0 reviews) — Socure is the leading platform for digital identity verification and trust. Its predictive analytics platform applies...
25. [EmpowerID](https://www.softwareadvice.co.uk/software/366337/empowerid) (0 reviews) — EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing...

-----

Page: 8 / 10\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=7)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=9)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Password Management Software](https://www.softwareadvice.co.uk/directory/4585/password-management/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.co.uk/directory/4311/authentication/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4549/identity-management/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@id":"https://www.softwareadvice.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Identity Management Software","description":"Page 8 - Discover the best Identity Management Software for your organisation. Compare top Identity Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8","about":{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Identity Management Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software","@type":"ListItem"},{"name":"Page 8","position":3,"item":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 8 - Best Identity Management Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.uk/directory/4549/identity-management/software?page=8#itemlist","@type":"ItemList","itemListElement":[{"name":"Appsian Security Platform","position":1,"description":"Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentication, network security, and other operations for PeopleSoft and SAP applications. The platform includes a transaction logging functionality, which lets administrators record user activities and session time.\n\n\nAppsian Security Platform allows IT teams to provide role-based permissions and hide data across search results, fields, queries and browsers via a unified portal. It offers a host of features such as remote access, configurable rule engine, location-based security, threat detection and prevention, risk assessment and more. Additionally, managers can generate reports to analyse usage trends, data access, privileged accounts usage, security alerts and other metrics using Appsian 360 application.\n\n\nAppsian Security Platform supports integration with various third-party systems including Oracle, Duo, Okta, Twilio and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd3ac52e-d138-450d-90b6-18161508aeb3.png","url":"https://www.softwareadvice.co.uk/software/182143/appsian-security-platform","@type":"ListItem"},{"name":"Evidian","position":2,"description":"Evidian is a cloud-based and on-premise identity governance and access management solution designed to help enterprises across finance, healthcare, telecom and various other sectors ensure the security of information systems. Features include access control, compliance management, reporting and audit. \n\n\nThe solution allows administrators to identify and manage users accessing the applications and define operational policies. Its analytics and intelligence module helps professionals identify high-risk users, dormant or orphaned accounts and abnormal behavior. The single sign-on (SSO) capability enables supervisors to delegate user accounts, manage permissions and perform re-authentication. \n\n\nEvidian offers integration with several third-party platforms such as Google Cloud, CyberArk, Wallix, Nagios and more. It comes with mobile applications for iOS and Android. Pricing is available on request and support is offered via documentation and online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76266302-b613-4fdd-b4b3-16167d3482fe.jpeg","url":"https://www.softwareadvice.co.uk/software/136849/evidian","@type":"ListItem"},{"name":"Efecte IGA","position":3,"description":"Efecte IAM helps enterprises automate identity and access management operations via a unified portal. The built-in predefined customizable workflows facilitate real-time management capabilities, enabling organizations to attend to identity and access requests. \n\nEfecte IAM lets users submit requests for business roles, new access and other services through a self-service portal. Managers can view and approve or reject the requests along with reasons. It offers a host of features such as customizable forms. real-time updates, interactive dashboard, graphs, reports, a drag-and-drop interface and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1d6e01e2-a65c-48d9-8970-ad5631a88ca3.png","url":"https://www.softwareadvice.co.uk/software/192772/efecte-identity-governance-and-administration","@type":"ListItem"},{"name":"swIDch Auth SDK","position":4,"description":"swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. \n\nswIDch Auth SDK's various functions are verified by FIDO alliance providing super secure passwordless authentication. The SDK also provides mobile OTP function that runs on a mobile application including the use of PIN inputs or fingerprint recognition, alongside mobile OTP which generates a one-time OTP number providing the same level of solid security as standard OTPs.\n\nFor an extra level of added security, swIDch Auth SDK provides login functions based on swIDch’s unparalleled  authentication technology, OTAC (One-Time Authentication Code). Even in a networkless environment, OTAC can identify users and devices by generating a one-time random code, providing an impenetrable authentication environment in cyber security.\n\nswIDch Auth SDK unprecedented pricing policy aims to empower organisations to develop innovative products and services, especially regarding authentication, identity and access management. The Pioneer membership, which consists of a one-pack license, is $5,000 whilst its Enterprise membership charges $45,000 allowing Unlimited Licensing for internal systems and 20 licenses for reselling. Both these memberships come with technical support services to help with any queries and technical requirements.\n\nswIDch Auth SDK is designed to empower System Integration companies, security solution vendors, organisations and enterprises, who want to deploy their developers and security teams to provide reliable all-in-one authentication based on proven international standard authentication security technology. Save time and increase efficiency with swIDch Auth SDK.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca86be52-cbd8-41d4-b08e-4c46e5926ad1.jpeg","url":"https://www.softwareadvice.co.uk/software/320674/otac","@type":"ListItem"},{"name":"GroupID","position":5,"description":"GroupID by Imanami is a Microsoft Gold Partner and recognized as the best Active Directory management tool in identity and access management. GroupID is designed to help businesses automate the creation and management of groups and users to streamline manual processes. GroupID works best because it enables organizations to solve real-world use cases.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/58caaf9b-97a0-42da-bc1d-b55dce50e2c7.png","url":"https://www.softwareadvice.co.uk/software/266697/groupid","@type":"ListItem"},{"name":"Prove ID","position":6,"description":"Prove ID is an end-to-end ID verification & management tool for online businesses. It enables remote parties to authenticate each other with a customizable verification process. The platform brings a performance-based approach to customer verification & online client acquisition.\n\nProve ID covers the following modules:\n\n- 70+ country ID card verification (NFC & OCR)\n- Custom document verification\n- Biometric matching\n- Liveness detection\n- Secure consent collection\n- AML check\n- P2P secure agent call\n- Automatic reminders\n- Verification fail analysis","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cb7961e2-9665-4d03-b8ae-89ceb257de28.png","url":"https://www.softwareadvice.co.uk/software/322148/prove-id","@type":"ListItem"},{"name":"Akku (Cloud Access Security Broker)","position":7,"description":"Akku is a cloud-based identity and access management solution that helps businesses protect and manage enterprise data through various security tools, including multi-factor authentication (MFA), single sign-on (SSO) and more. \n\nAkku allows organizations to establish, define and enforce password policies for employees in compliance with industry regulations. Managers can set up location or time-based restrictions on content and validate users’ identities through additional authentication methods, such as one-time passwords or push notifications. \n\nAkku facilitates integration with several third-party applications including Bitbucket, Slack, Salesforce and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d23ac41-a4d2-4599-959c-d7f95640dd84.png","url":"https://www.softwareadvice.co.uk/software/178249/akku-cloud-access-security-broker","@type":"ListItem"},{"name":"IDHub","position":8,"description":"IDHub is a fully customizable, flexible, and user-friendly IAM solution. We know managing a highly technical IAM system can be challenging. However, convincing users how and why to use it is often as difficult. After nearly two decades of IAM experience, we designed IDHub with the needs of users and administrators in mind, for the best in usability, functionality, and customization, to make your jobs easier. We constantly expand our extensive training videos and easy read documentation, to make using and managing IDHub as easy as possible. We believe IAM processes should be incredibly fast. Our fail fast, recover faster model, allows businesses to launch and deploy complete systems and updates within hours and days, not weeks and months.\n\nAutomated processes, combined with manager administrator controls for day-to-day tasks, take the burden off IT departments, and empower managers with more control over their direct team. Allow your IT experts to focus on critical issues, and leave the simple IAM tasks to your regular users, saving you countless hours and revenue, while increasing productivity. Managers and users can request access and entitlements for internal and 3rd-party applications, with a simple point and click interface. In addition, users can track the process from request to provisioning. \n\nAdministrators and managers can design and build custom workflows for requests, approvals, and certification processes for each application, with our no-code drag-and-drop workflow builder, without needing a developer or IT department. Guarantee security compliance for HIPAA, NERC, CIP, or DSS with custom certifications. \n\nAutomate your certification processes on individual schedules, using conditional rule queries, for specific groups, collections, or applications based on any available attributes or conditions for granular targets. Identify and target specific high-risk resources or users according to your rules, or use the built-in high-risk ?lters. Schedule automatic triggers for certi?cations, reconciliations, audits, custom work?ows, or reminder emails.\n\nDon’t get locked into an authorization system that will frustrate users and create management issues. Create the perfect login experience for your users.  Our flexible solution allows organizations to directly integrate with any authorization tool to meet user needs and maintain security policies.\n\nCreate custom dynamic user roles, based on entitlements, applications, and user attributes. Automatically assign or remove roles, based on changing user attributes. Role-based access automatically provisions and de-provisions resources, based on your rules. Any role change will immediately trigger account changes, ensuring appropriate access, rights, and permissions are associated with the account. Proxy users allow users to designate other team members, to take on their responsibilities immediately, in a sudden change in employment.\n\nContinuously scan employment status of all users with regularly scheduled audits. Then, remove user access to sensitive data in seconds, to help prevent data breaches. Customizable service requests give users the ability to request any service or action. Create a request process for, o?ce equipment, maintenance, printing, devices, or any service your team needs. Save and share lists allow users to compile requestable resources that can be reused for recurring tasks or shared with other users.\n\nUtilize our provided dev environment to test new implementations, workflows, or other customizations without affecting your production install. Gain a holistic view of your apps, resources, and users with our complete set of enterprise tools, all with SaaS pricing in our simple, user-based pricing model. Get IAM features not available anywhere else, free up your IT department, keep your employees happy, and increase your bottom line, with IDHub by Sath.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/db560d58-a418-4411-bea9-3b6c54e75dc3.png","url":"https://www.softwareadvice.co.uk/software/328462/idhub","@type":"ListItem"},{"name":"Cognito","position":9,"description":"Cognito Flow makes it easy to verify your customers' identities, around the world, seamlessly. \n\nStay compliant with KYC and AML regulations, or use Cognito to improve trust and safety on your platform.\n\nCognito makes it easy to verify and screen customers with a few lines of code. Using sophisticated machine learning, Cognito Flow automates identity verification, reducing manual reviews and reducing friction during the sign-up process. \n\nUsed by financial institutions, social networks, nonprofits, cryptocurrency platforms, and others,","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/83ebbd95-5e84-4877-849f-c566614c3a25.png","url":"https://www.softwareadvice.co.uk/software/324642/cognito","@type":"ListItem"},{"name":"TechIDManager","position":10,"description":"TechIDManager is a cloud-based and on-premise password and identity management solution that enables MSPs of all sizes to manage their tech's accounts across all their client domains. From onboarding to offboarding, TechIDManager is able to manage tech access by allowing the MSPs to create custom groups and permissions to fit the needs of the tech's access.  By using TechIDManager, the MSP eliminates the need for shared passwords; Satisfying compliance requirements for HIPAA, PCI, CIS and more! \n Passwords on all domains are rotated every 24 hours \n and is downtime tolerant for both cloud and on-premise.  All information is encrypted both on the wire and at rest.  TechIDManager is affordable for MSPs of every size.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4cbd19b3-9baf-4b69-8e4e-f8832a7f8b6d.jpeg","url":"https://www.softwareadvice.co.uk/software/340042/techidmanager","@type":"ListItem"},{"name":"IBM Security zSecure","position":11,"description":"IBM Security zSecure is a suite of products designed to simplify mainframe security administration, automate auditing processes, and enforce security policies to reduce risk. This solution supports IBM Z hardware, software, virtualization, and standard enterprise security management (ESM) tools. \n\nIBM Security zSecure includes the following products IBM Z Multi-Factor Authentication, zSecure Command Verifier, zSecure Audit, zSecure Alert, zSecure Admin, zSecure Visual, zSecure CICS Toolkit, and zSecure Manager for RACF z/VM. The suite helps organizations strengthen user controls, detect internal and external threats, access real-time alerts, monitor compliance, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c9cb3be-9a1b-4a71-8bd5-1fc9228fa645.jpeg","url":"https://www.softwareadvice.co.uk/software/350402/ibm-security-zsecure","@type":"ListItem"},{"name":"ManageEngine Free Active Directory Tools","position":12,"description":"ManageEngine Free Active Directory Tools is a zero-cost solution that has a user-friendly GUI to help expedite common administrative tasks while making reports without erorrs. The software comes with a CSV generator, AD Query tools, terminal session manager, and an AD Replication management to manually force replicated data across domain controllers.  \n\nOther features include a DMZ Port Analyzer to detect ports that are not used for application functioning, a DC monitor to analyze performance parameters, and a Duplicates Identifier to detect duplicate objects within a domain.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7e4c3bb2-c319-4d4d-b4a0-718b3eef452d.png","url":"https://www.softwareadvice.co.uk/software/361467/manageengine-free-active-directory-tools","@type":"ListItem"},{"name":"Daito","position":13,"description":"Daito is a web-based 2FA authenticator that simplifies protecting shared accounts with 2FA while enabling you to securely share access to those 2FA tokens with others.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34fd1de-eae0-4be2-b55c-2508684c021e.png","url":"https://www.softwareadvice.co.uk/software/366113/daito","@type":"ListItem"},{"name":"Keystash","position":14,"description":"Keystash is a Linux user access and SSH key management solution.\nCreating and managing Linux user accounts, privileges and SSH keys is typically a manual task, however Keystash provides a centralized management system that can connect across your Linux environments, ensuring that only the right people have access to the necessary servers with the correct privileges. \n\nKeystash significantly increases IT security and automation in Linux environments and enables good IT policy and governance with clear workflows for access with complete audit logs. Enforce high security policy on your SSH Servers, including disabling password access and enforcing SSH Two Factor Authentication.\n\nKeystash brings visibility to your Linux environments and stops the sprawl of ad-hoc SSH Key creation by centralizing and guiding users during the key creation process.\n\nAchieve alignment and compliance with the top IT Security frameworks such as ISO27001, SOC2, PCI-DSS and HIPAA by leveling up your Linux security posture.\n\nIt allows administrators to create and manage Linux user accounts and groups, create and manage user SSH Keys, control access and privileges across multiple Linux servers, enforce SSH Server security like SSH Two Factor Authentication, gain visibility of all actions across the platform with audit logs and history, keep a watchful eye on your Linux environment inventory with detailed information like location, IPs and OS details, and deploy the Keystash agent to your Linux servers quickly and easily using standard software repo's: YUM and APT-GET.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fd542df0-8b0e-48e1-804d-1d04b54a722d.png","url":"https://www.softwareadvice.co.uk/software/366883/keystash","@type":"ListItem"},{"name":"VeriFinger SDK","position":15,"description":"VeriFinger SDK is a powerful, multiplatform and fully scalable fingerprint identification library. It can be used as an SDK and runs on multiple platforms. The VeriFinger algorithm is based on deep neural networks and follows the commonly accepted fingerprint identification scheme, which uses a set of specific fingerprint points (minutiae) along with a number of proprietary algorithmic solutions that enhance system performance and reliability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81882b1b-2602-465e-b39f-d58452a0ed64.png","url":"https://www.softwareadvice.co.uk/software/311417/verifinger-sdk","@type":"ListItem"},{"name":"SafeNet Trusted Access","position":16,"description":"SafeNet Trusted Access: Provide simple, secure access to all your apps with authentication everywhere.\n\nCloud-based applications play a vital role in improving productivity and meeting the business goals of digital-first enterprises. Along with protecting your employees’ digital identities in a multi-cloud environment, you must also ensure the security of your users accessing sensitive data from literally anywhere.\n\nSafeNet Trusted Access is an access management and authentication service that ensures no user is a target by allowing you to expand authentication to all users and apps with diverse authentication capabilities. Because it gives you the power to control access to all apps with the right policy, you can enforce the right authentication method for the right user.\n \nSafeNet Trusted Access is unique in its ability to meet the diverse needs of diverse users in your organization by proposing the right authentication method for the right user. Organizations, no matter their size or industry, can securely manage their digital transformations by protecting more apps and more users through better MFA coverage. In today’s threat environment, all users and applications are potential targets. To ensure secure access anywhere, MFA should be expanded to cover all possible use cases.\n\nOffering contextual and risk-based authentication capabilities through high-assurance FIDO2 devices, as well as Push and pattern-based authentication, SafeNet Trusted Access allows you to expand secure access to any app and all users by enabling users to authenticate anywhere, whatever their circumstances.\n\nEach time a user logs into a cloud application, SafeNet Trusted Access validates the user’s identity, assesses which access policy should be enforced, and applies the appropriate level of authentication with Smart Single Sign-On.\n\nSafeNet Trusted Access offers many benefits to organizations seeking to migrate to the cloud simply and securely.\n\nPrevents data breaches by applying different MFA methods, including phishing-resistant FIDO devices and access controls, based on the environment risk assessment while eliminating passwords.\n\nSmooth integration and support for existing IAM schemes ensures you can secure cloud transformation without having to rip and replace your existing authentication schemes. \n\nClose security gaps in your environment by applying the right type and method of authentication to all your users depending on their context.\n\nSimplify compliance with real-time auditing of who is accessing which app and how.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/12d60786-5a1b-40c9-8f3b-5634e62030b5.png","url":"https://www.softwareadvice.co.uk/software/446053/safenet-trusted-access","@type":"ListItem"},{"name":"Cloud Identity","position":17,"description":"Cloud Identity is the most reliable cloud multi-biometric platform in the world, to validate the identity of people; through an end-to-end, frictionless and omnichannel process. It works by capturing biographical and biometric data of the user, such as: IDs from more than 194 countries, voice, fingerprints and facial biometrics. The data is sent and validated by government institutions that issue the ID presented by the user, to testify the information, validate deduplication, this with the aim of being able to identify if an identity theft is attempted and guarantee that the person is who they say they are. Finally, if the solution determines that the biometrics are not duplicated, they are stored directly in the multi biometric engine in the cloud to make the user's digital identity available in the different channels where it must be authenticated. \n\nCloud Identity lives in Mexican territory in 2 datacenters that have the highest security and availability certifications on the market to ensure that the platform cannot be compromised and will be up and running. In addition, it has tools such as APIs and SDKs that allow integration with other systems. \n\nWith a multi biometric combination (eg fingerprint + face), the reliability of our platform performs with a false negative identification rate of 0.22% and a false positive identification rate of 0.3% in a Approximate dataset > 1M records. In this way, Cloud Identity is a modular platform that adapts to your business needs and reduces fraud due to theft and identity theft by up to 98%. Identity is the most important thing we have in the digital world, help us protect it with Cloud Identity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6f75a555-62d9-48cd-b7a0-894ae8ecd8c7.png","url":"https://www.softwareadvice.co.uk/software/369911/cloud-identity","@type":"ListItem"},{"name":"walt.id Identity Infrastructure","position":18,"description":"We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. \n\nThe products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4bf6ea7d-9b03-435a-ae45-2a389b477d5e.png","url":"https://www.softwareadvice.co.uk/software/322610/ssi-kit","@type":"ListItem"},{"name":"OLOID","position":19,"description":"OLOID is an authentication platform that provides secure access for frontline workers. It offers a range of multi-factor authentication options such as face recognition, NFC, badge, palm and QR code to eliminate the need for passwords. The platform caters to various industries including manufacturing, retail, healthcare, contact centers and pharmaceuticals.\n\nThe platform features a workflow automation engine that streamlines identity-related processes like user onboarding and account management. It utilizes pre-built connectors and customizable templates to enhance security and operational efficiency. OLOID also offers a tablet-based time tracking system that leverages facial recognition, QR codes, access cards, and NFC for secure and efficient employee authentication. Additionally, the system integrates with various third-party time and attendance systems.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/218d2c86-591b-4a64-8afd-01272fdabb35.jpeg","url":"https://www.softwareadvice.co.uk/software/377837/oloid","@type":"ListItem"},{"name":"Kycaid","position":20,"description":"Kycaid is a one-stop-shop compliance platform that is aimed to help businesses of all sizes and industries reduce risks, enhance customer interaction and simplify many business processes through holistic KYC&AML services.\nKycaid is on the market since 2018 and has developed into a global compliance services provider that operates in 248 territories, and works with more than 10 000 different documents worldwide. \n\nThe special feature of Kycaid solutions is that in addition to the automatic AI-based verifications, we also involve a large staff of compliance specialists. This provides improved interaction with your customers, as the number of verification failures and declines is reduced, leading to better conversions for you.\nSupport specialists and compliance managers are available 24/7 via chat.\n\nAnother convenient feature is the payment system. Kycaid has no prepaid tariff plans, you pay as you go only for the services you use. After replenishing your account, you can use them at least all year round!\n\nFor the integration, we offer 3 ways: API integration, pre-set verification forms and Mobile SDK. It usually takes from a few hours to a couple of days to integrate. Additionally, our specialists will brand all the verification processes for you free of charge, so your customers won't notice they left your website.\n\nThe price estimator and some industry information in the blog section on the Kycaid website are going to be a nice bonus for you if KYC&AML services are new for you or if you would want to educate yourself more on this matter.\n\nKycaid is in constant development of new services, and features and is ready to find individual solutions for businesses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7794041e-838e-4146-8ad9-888c4387d292.jpeg","url":"https://www.softwareadvice.co.uk/software/357929/kycaid","@type":"ListItem"},{"name":"IGA Toolkit","position":21,"description":"IGA Toolkit is a cloud-based identity management solution that allows organizations to manage user identity and security management operations across departments and teams. The platform allows users to test multiple security control through user termination, access pattern analysis and other methods. \n\nIGA Toolkit supports integration with various third-party IT service management (ITSM) systems such as ServiceNow and Oracle Applications Cloud. It offers a host of features like multi-factor authentication, user provisioning, privileged account management, onboaridng management, role-based access and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b0bc68c6-7caf-442d-8356-d75cf17bc1c7.png","url":"https://www.softwareadvice.co.uk/software/252578/iga-toolkit","@type":"ListItem"},{"name":"Securden Unified PAM","position":22,"description":"Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices.\n\nThe major modules of Securden Unified PAM are password management, privileged account management, secure remote access, application control, endpoint privilege management, privileged session management, and SSH key management. The platform supports compliance with NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001.\n\nInstallation typically takes only a few minutes, and a complete production-ready PAM can be achieved in less than a month with Securden Unified PAM.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dad4d02c-997e-493e-b9f5-7abb5702b72d.jpeg","url":"https://www.softwareadvice.co.uk/software/359258/privileged-account-manager","@type":"ListItem"},{"name":"CloudEagle","position":23,"description":"CloudEagle.ai is an AI-powered platform built to simplify how enterprises manage SaaS applications and identities. By delivering continuous orchestration across SaaS security, identity governance, and SaaS management, the platform enables organizations to gain full visibility and control over their SaaS and AI ecosystem.\n\nToday’s organizations operate across hundreds of SaaS applications used by employees across multiple departments. This rapid expansion often creates security gaps, identity sprawl, unused licenses, and unmanaged shadow AI tools. CloudEagle solves these challenges by creating a unified governance layer that connects data across IT, HR, Finance, and Security systems.\n\nWith 500+ integrations, CloudEagle continuously monitors identity activity, application usage, and access permissions. It identifies unauthorized apps, excessive privileges, inactive accounts, and unused licenses in real time. Through continuous orchestration, teams can automate access management, enforce governance policies, strengthen SaaS security, and optimize software spend without disrupting existing workflows.\n\nCloudEagle enables organizations to get up and running in under 30 minutes, delivering immediate improvements in visibility, security, and operational efficiency. The platform has analyzed $20B+ in software spend and generated $2B+ in verified savings, supporting enterprises such as RingCentral, Automation Anywhere, Shiji, and Rec Room.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3bed0083-cc9d-4820-af99-328d2ec24efc.jpeg","url":"https://www.softwareadvice.co.uk/software/422972/cloudeagle","@type":"ListItem"},{"name":"Socure","position":24,"description":"Socure is the leading platform for digital identity verification and trust. Its predictive analytics platform applies artificial intelligence and machine learning techniques with trusted online/offline data intelligence from email, phone, address, IP, device, velocity, and the broader internet to verify identities in real-time. The company has more than 1,900 customers across the financial services, gaming, healthcare, telecom, and e-commerce industries, including four of the top five banks, seven of the top 10 card issuers, three of the top MSBs, the top payroll provider, the top credit bureau, the top online gaming operator, the top buy now pay later provider, and over 100 of the largest FinTechs. Marquee customers include Chime, Varo Money, Public, Stash, and DraftKings. Investors include Accel, Commerce Ventures, Scale Venture Partners, Flint Capital, Capital One Ventures, Citi Ventures, Wells Fargo Strategic Capital, Synchrony, Sorenson, Two Sigma Ventures, and others.\n\nSocure has received numerous industry awards and accolades, including being named to Forbes’ America’s Best Startup Employers 2021, being awarded Best New Technology Introduced Over the Last 12 Months – Data and Data Services at the 2020 American Financial Technology Awards (AFTAs), being ranked number 70 in Deloitte’s Technology Fast 500, being listed as a Gartner Cool Vendor, being recognized by Forbes as one of the Top 25 Machine Learning Startups to Watch, being named to CB Insights: The FinTech 250, and being awarded Finovate’s Award for Best Use of AI/ML, to name a few.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/04ad5e08-4c50-4908-8cd9-efbc302a2a6c.png","url":"https://www.softwareadvice.co.uk/software/269179/socure","@type":"ListItem"},{"name":"EmpowerID","position":25,"description":"EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing and other sectors to securely access cloud and on-premise applications. Professionals can automatically create, manage or delete user groups and configure Policy-Based Access Controls (PBAC) for staff members.\n\nKey features of EmpowerID include single sign-on (SSO), multi-factor authentication (MFA), role mining and lifecycle management. Its cloud directory supports Remote Authentication Dial-In User Service (RADIUS) and Lightweight Directory Access Protocol (LDAP) among other authentication options. Additionally, it helps users reset their passwords using a self-service platform.\n\nEmpowerID offers mobile applications for iOS and Android devices, enabling professionals to approve login requests, view, edit, rename or delete accounts, scan third-party QR codes and more. The product is available on monthly or annual subscriptions and support is extended via phone, email, video tutorials and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c076002-a8d6-48e4-af81-4e502b7db592.png","url":"https://www.softwareadvice.co.uk/software/366337/empowerid","@type":"ListItem"}],"numberOfItems":25}
</script>
