---
description: Page 2 - Discover the best Access Governance Software for your organisation. Compare top Access Governance Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 2 - Best Access Governance Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Access Governance Software](https://www.softwareadvice.co.uk/directory/4665/access-governance/software) > [Page 2](https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2)

# Access Governance Software

Canonical: https://www.softwareadvice.co.uk/directory/4665/access-governance/software

Page: 2 / 5\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4665/access-governance/software)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=3)

-----

## Products

1. [Symantec VIP](https://www.softwareadvice.co.uk/software/295157/symantec-vip) — 4.7/5 (27 reviews) — Symantec VIP is an identity management software that helps organizations to manage and protect their online identitie...
2. [Zluri](https://www.softwareadvice.co.uk/software/413652/zluri) — 4.9/5 (27 reviews) — Zluri is a data-driven enterprise SaaS management platform that facilitates discovery, management, optimization, and ...
3. [ManageEngine Password Manager Pro](https://www.softwareadvice.co.uk/software/376425/manageengine-password-manager-pro) — 4.3/5 (23 reviews) — ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores ...
4. [Contentverse](https://www.softwareadvice.co.uk/software/357028/contentverse) — 4.1/5 (19 reviews) — Contentverse is document management for every department in every industry. It's a blank slate for your team to recre...
5. [Secomea](https://www.softwareadvice.co.uk/software/440313/secomea) — 4.7/5 (19 reviews) — Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It i...
6. [Florbs](https://www.softwareadvice.co.uk/software/398161/florbs) — 4.7/5 (17 reviews) — Florbs, an official Google Cloud Partner, offers innovative and user-friendly solutions to streamline business operat...
7. [SailPoint](https://www.softwareadvice.co.uk/software/103394/sailpoint) — 4.2/5 (13 reviews) — From the most sophisticated identity technologies to the scale to support complex, global enterprises, SailPoint leve...
8. [Portnox CLEAR](https://www.softwareadvice.co.uk/software/355474/portnox-clear) — 4.1/5 (11 reviews) — Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect c...
9. [FastPass IVM](https://www.softwareadvice.co.uk/software/437791/fastpass-identity-verification-manager) — 4.8/5 (11 reviews) — Workforce Identity Verification Built for the IT Service Desk FastPass Identity Verification Manager (IVM) FastPass I...
10. [Zygon](https://www.softwareadvice.co.uk/software/523084/Zygon) — 5.0/5 (10 reviews) — Zygon is an all-in-one platform that automates the management of applications and accounts for modern IT and security...
11. [SecurEnds Identity Governance and Access Control](https://www.softwareadvice.co.uk/software/93806/securends) — 4.8/5 (9 reviews) — SecurEnds is an identity management and security compliance solution that allows businesses to automate internal audi...
12. [ManageEngine PAM360](https://www.softwareadvice.co.uk/software/361414/pam360) — 4.3/5 (9 reviews) — ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to...
13. [Corma](https://www.softwareadvice.co.uk/software/519580/Corma) — 4.9/5 (9 reviews) — Corma is the access management solution crafted to simplify your software ecosystem and streamline your IT operations...
14. [Zilla Security](https://www.softwareadvice.co.uk/software/239027/zilla-security) — 4.7/5 (7 reviews) — Zilla Security is an early-stage security startup that provides software-as-a-service security management platform.
15. [Authfy](https://www.softwareadvice.co.uk/software/344910/authfy) — 4.9/5 (7 reviews) — Authfy is a SEC4U low-code platform, a company focused on Cyber Identity, which enables secure digital journeys, prov...
16. [Amazon Cognito](https://www.softwareadvice.co.uk/software/395552/amazon-cognito) — 4.4/5 (5 reviews) — Amazon Cognito is an authentication management solution that helps organizations streamline user sign in, sign up and...
17. [OpenText Identity Manager](https://www.softwareadvice.co.uk/software/282935/netiq-identity-manager) — 4.8/5 (5 reviews) — NetIQ Identity Manager is an identity management and access governance solution that includes features for password s...
18. [Infisign](https://www.softwareadvice.co.uk/software/436781/infisign) — 4.8/5 (5 reviews) — By embracing the Zero Trust philosophy, Infisign ensures a holistic approach to security by continuously verifying th...
19. [Entrust Identity as a Service](https://www.softwareadvice.co.uk/software/93746/intellitrust) — 5.0/5 (4 reviews) — Entrust Identity as a Service is a cloud-based identity and access management service that provides digital security ...
20. [Uniqkey](https://www.softwareadvice.co.uk/software/425970/uniqkey) — 5.0/5 (4 reviews) — Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies w...
21. [Userfront](https://www.softwareadvice.co.uk/software/260196/userfront) — 5.0/5 (3 reviews) — Userfront gives secure, pre-configured authentication and authorization that stays up to date automatically. Teams fo...
22. [Access Rights Manager](https://www.softwareadvice.co.uk/software/412478/access-rights-manager) — 4.7/5 (3 reviews) — Access Rights Manager is a Windows-based access management tool that assists network security teams with directory mo...
23. [AWS Organizations](https://www.softwareadvice.co.uk/software/396514/aws-organizations) — 5.0/5 (3 reviews) — AWS Organizations is an access solution that enables users to treat multiple AWS accounts as a single account. Users ...
24. [Heimdal Application Control](https://www.softwareadvice.co.uk/software/242920/heimdal-application-control) — 4.0/5 (2 reviews) — Heimdal Application Control is an application management and user rights curation solution that takes a novel approac...
25. [Teleport](https://www.softwareadvice.co.uk/software/361499/teleport) — 5.0/5 (2 reviews) — Teleport is a gateway for managing access to K8s clusters, Linux \&amp; Windows servers, databases, and applications. ...

-----

Page: 2 / 5\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4665/access-governance/software)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=3)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.co.uk/directory/4311/authentication/software)
- [Network Access Control (NAC) Software](https://www.softwareadvice.co.uk/directory/4433/network-access-control/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.co.uk/directory/4427/ciam/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4665/access-governance/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Access Governance Software","description":"Page 2 - Discover the best Access Governance Software for your organisation. Compare top Access Governance Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2","about":{"@id":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Access Governance Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Best Access Governance Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Symantec VIP","position":1,"description":"Symantec VIP is an identity management software that helps organizations to manage and protect their online identities. It provides a secure platform for organizations to store, share and update sensitive data. Symantec VIP also allows organizations to control access to applications and systems.\n\nThe platform enables managers to assign and revoke access rights for users to ensure that the system is secure. Symantec VIP also offers a single sign-on functionality across multiple systems and applications, ensuring that users do not have to remember multiple passwords.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f51aa499-d501-460d-b11a-ff40cf22fc2d.png","url":"https://www.softwareadvice.co.uk/software/295157/symantec-vip","@type":"ListItem"},{"name":"Zluri","position":2,"description":"Zluri is a data-driven enterprise SaaS management platform that facilitates discovery, management, optimization, and compliance of an organization's SaaS stack.\n\nZluri helps organizations discover their entire SaaS ecosystem and helps them eliminate SaaS wastage by removing duplicate apps, finding unused and underused apps, and consolidate apps with overlapping functions.\n\nZluri also helps automate IT tasks like SaaS procurement, onboarding and offboarding of apps, and contract renewals.\n\nIt also secures SaaS ecosystems by discovering unapproved apps, remove unsecured apps and eliminate compliance risks.\n\nIn short, Zluri puts IT teams back in control of their SaaS stack.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c3accaa-4b14-4454-9e17-ac658414bb26.png","url":"https://www.softwareadvice.co.uk/software/413652/zluri","@type":"ListItem"},{"name":"ManageEngine Password Manager Pro","position":3,"description":"ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b277f6af-1b08-4a21-a0d9-861949693d0f.jpeg","url":"https://www.softwareadvice.co.uk/software/376425/manageengine-password-manager-pro","@type":"ListItem"},{"name":"Contentverse","position":4,"description":"Contentverse is document management for every department in every industry. It's a blank slate for your team to recreate your storage processes and even make them better! \n\n  • Scan, upload, or drag-and-drop files into the system\n  • Batch scan and index options for bulk data import\n  • Create new documents from pre-loaded templates\n  • Detect keywords, barcodes, and QR codes on pages\n  • Automatically index and file your documents\n  • Easily search for content and navigate the folder tree\n  • Securely share docs without them leaving the server\n  • Edit Word, Excel, and PDF forms online\n  • Automate all of your business processes \n  • Integrate DocuSign or create eSignatures\n  • Set up retention policies for contract renewals\n  • Implement best practices and regulatory compliance\n\nCustomers in many different industries have had success using Contentverse to cut down on wasted time and money. No matter where you're coming from, Contentverse is versatile enough to support your unique needs. Industries we serve include...\n\n  • Manufacturing and distribution companies\n  • Law enforcement and justice departments\n  • K-12 and higher education\n  • Non-profit and not-for-profit organizations\n  • Municipal and county government\n  • Food & beverage, grocery, and hospitality \n  • Banking and finance\n  • Insurance firms\n  • Aerospace, automotive, and engineering \n  • Medical laboratories and chemical plants\n  • Healthcare \n\nReach out to our sales staff if you are interested in an in-depth case study in your industry or a related use case. \n\nContentverse uses 128-bit encryption to protect your data in the system. Administrators can set up user permissions for their staff so that only authorized personnel can see, edit, and interact with each document. \n\nWith a browser-based interface any user will find familiar and simple document creation, management, and editing controls, Contentverse is easy to learn and easy to use. Whether you need to archive bulk data and digitize legacy files or you just need to look up some recent invoices, forget the headaches of your old document management solution. Everyday tasks are effortless. We provide quick, complete videos for more advanced features. \n\nOur team continues to innovate as we update and upgrade Contentverse. Some of our recent additions include the DocuSign integration, new dashboard for quick file access and workflow monitoring, and editing of common document types in the file viewer. \n\nContentverse can be purchased as an ongoing subscription and can be implemented in the cloud or on a local server. If you have a unique setup, give us a call about custom plans and pricing.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/df34afb7-c9ff-4cca-855a-df951d662003.png","url":"https://www.softwareadvice.co.uk/software/357028/contentverse","@type":"ListItem"},{"name":"Secomea","position":5,"description":"Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It is utilized by nearly ten thousand customers worldwide across numerous sites, enabling them to remotely manage their machines and prevent downtime.\n\nSecomea's solution integrates with any OT equipment, allowing organizations to secure their cyber-physical systems. This enables technicians to remotely access and intervene in production facilities, reducing travel expenses, response time, and security risks.\n\nThe implementation of Secomea's solution typically requires just one day per site. With a user-friendly and intuitive interface, Secomea aims to simplify secure remote access while maintaining global oversight and local control.\n\nSecomea's features:\n\nIdentity and access management features:\n\n- Privileged access management: Set up hierarchy-based user roles based on the principle of least privilege\n- Granular access control: Control access on an individual level with granular permissions\n- Advanced grouping: Perform mass administration of user permissions\n- Just-in-time (JIT) access: Grant temporary or scheduled access to specific assets\n- Always-on access: Set up a static, persistent tunnel connection between two separate networks\n- Request for access: Users can request access to specific assets, and admins can approve it in one click\n- Multi-Factor Authentication (MFA): Verify users’ identities via MFA with SMS authentication\n- Single Sign-On (SSO): Secure users’ authentication via Single Sign-On (SSO) with Azure AD or Okta\n\nRemote access features:\n\n- Agentless, web-based system: Use Secomea directly from your browser – no need to install a plugin or application\n- Direct access via lightweight client: Supporting OT protocols such as Modbus, Profinet, EtherCAT, Ethernet/IP, etc.\n- Indirect and clientless access: Supporting remote access from your browser via RDP, VNC, SSH, Telnet, HTTPS\n- Secure file transfer: Scan files transferred remotely for viruses or malware to assess their safety\n\nAudit and monitoring:\n\n- Real-time activities monitoring: Get an overview of ongoing remote access sessions from the Prime Dashboard\n- Audit logs: Track every activity performed on your machines to document who did what and when\n- Session recordings: Capture videos of remote access sessions for troubleshooting and audit purposes\n- Alerts and automated actions: Get SMS/email notifications for specific events and automate triggered actions\n- Access gateways information: Get a centralized overview of all gateways with detailed info (serial number, IP, firmware, last heartbeat). Register info on their physical location and contact details for streamlined operations\n- Vulnerability hub: Spot gateways that are not running the latest firmware version and those whose models are approaching End of Life or End of Support to ensure timely updates and replacements\n\nCustomization and integrations:\n- API access: Integrate Secomea with other tools you use to run your operations\n- AD integration: Changes implemented in Microsoft Azure Active Directory are synced hourly in Secomea’s access management server.\n- Security Information and Event Management (SIEM) integration: Integrate your SIEM system (Syslog, Splunk, etc.) with Secomea\n- Data Collection Module (DCM) and cloud integration\n- Collect data from your industrial equipment using its native data collection protocols (OPC UA, Modbus TCP, Siemens S7, Ethernet/IP, MQTT, etc.) and send it to your chosen cloud solution for further processing (Microsoft Azure IoT Hub, Amazon AWS IoT Core, Software AG Cumulocity IoT, Aveva Insight, MQTT data servers, etc.)\n- Support system integration: Integrate your support system with Secomea’s to centralize ticket management\n- Branding: Customize your URL and login page to align it with your corporate brand.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4ef015ad-ad45-47d0-9bc4-3367d535d5f0.jpeg","url":"https://www.softwareadvice.co.uk/software/440313/secomea","@type":"ListItem"},{"name":"Florbs","position":6,"description":"Florbs, an official Google Cloud Partner, offers innovative and user-friendly solutions to streamline business operations in Google Workspace while ensuring security. With extensive experience in Google Workspace, we've developed powerful software tools that effectively tackle common challenges faced by businesses.\n\nThe solution includes:\n\nSecurity & Auditing to provide a full overview of all files shared across your organization and allow you to instantly update file access permissions to protect your sensitive data.\n\nAdmin Automation for efficient user lifecycle workflows that can save you 2 hours per user offboarding and eliminate the risks of human error that can result in data exposure.\n\nEmail Signature Management to improve accuracy and brand consistency and amplify your marketing efforts.\n\nWith Florbs, you'll have access to cutting-edge technology and expert guidance to optimize your operations in Google Workspace.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/40d5ebaf-cf0c-4431-a154-22382144d13a.png","url":"https://www.softwareadvice.co.uk/software/398161/florbs","@type":"ListItem"},{"name":"SailPoint","position":7,"description":"From the most sophisticated identity technologies to the scale to support complex, global enterprises, SailPoint leverages a common set of services to power our AI-driven Identity Security Cloud solutions and provides speedier delivery, deeper integration, richer configuration, and reduced maintenance costs for our customers. \nExperience quick time-to-value, enhanced adoption, and improved user experiences, making SailPoint identity security platform the strategic ally for confidently navigating the intricate landscape of identity security.\n\nIt starts with a solid foundation:\n- Data model - A robust, industry leading data model that uses a secure and standardized approach to access, manage, analyze, and report all identity data and the context necessary to optimize access.\n\n- Machine learning - A rich library of machine learning models providing personalized insights to help organizations make informed access decisions, remediate risky access in real-time and meet compliance requirements.\n\n- Event-driven orchestration - Automate simple and complex identity use cases through configurable workflows & forms when changes happen and avoid the need for manual intervention.\n\n- Personalized insights and reporting - Demonstrate compliance and manage the performance of your identity program with personalized dashboards, notifications, reporting, and action-oriented insights across your identity ecosystem.\n\n- Connectivity - Seamlessly connect your entire ecosystem through thousands of connectivity options that extend your ability to embed identity context across your hybrid environments and to centrally manage and control access.\n\n- Extensibility - A framework that uses SailPoint’s APIs and event triggers to enable deep configuration across external systems empowering organizations to easily thread identity security across their ecosystem.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ce08236e-1a58-4537-ac26-4d5d6735f7c0.png","url":"https://www.softwareadvice.co.uk/software/103394/sailpoint","@type":"ListItem"},{"name":"Portnox CLEAR","position":8,"description":"Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect compromised devices, and automate mitigation to high-risk devices. It allows staff members to configure essential security policies like two-factor authentication and define access control policies for wireless, wired and VPN connections.  Portnox Clear is used across a wide variety of industries such as in banking, defense, biotech, engineering, healthcare, and legal services.\n\nPortnox Clear enables IT professionals to set up role-based access, so only those who need access have access and guest accounts stay out of confidential company resources. The group-level policies allow administrators to create risk policies for multiple users and devices from within a centralized platform. Additionally, administrators can not only monitor device risks based on several custom criteria, such as encryption, location, firewall, certificates, updates and more, but they can automate mitigation of risk such as updating the firewall or uninstalling a risky application.\n\nPortnox Clear is vendor agnostic, so it works with your existing network infrastructure.  It also seamlessly integrates with several essential technology solutions such as MDM, AD,  SIEM, and many more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45e81243-0a43-460f-b6b8-902177a09f82.png","url":"https://www.softwareadvice.co.uk/software/355474/portnox-clear","@type":"ListItem"},{"name":"FastPass IVM","position":9,"description":"Workforce Identity Verification Built for the IT Service Desk\nFastPass Identity Verification Manager (IVM)\nFastPass Identity Verification Manager (IVM) is a workforce identity verification solution designed specifically to secure IT service desk interactions. It helps organizations confirm user identities before access is granted or sensitive support actions are completed, reducing exposure to social engineering, credential misuse, and unauthorized access.\nRather than relying on informal checks or static questions, IVM introduces structured, policy-based identity verification directly into service desk workflows. Support agents are guided step by step through consistent verification processes, improving both security outcomes and operational reliability.\nAdaptive, Role-Based Identity Verification\nFastPass IVM supports role-based verification, allowing organizations to apply different identity assurance levels depending on user type and risk. Employees, contractors, remote workers, executives, and privileged users can all be verified using workflows aligned with their role, access rights, and security policies.\nVerification is adaptive and context-aware, taking into account factors such as authentication methods, user attributes, device behavior, and request type. This ensures identity checks are neither too weak nor unnecessarily complex.\nEmbedded in ITSM Workflows\nIVM integrates with leading IT Service Management platforms, including ServiceNow, embedding identity verification directly into existing ticket workflows. Service desk agents work within familiar systems while following standardized, auditable verification steps that reduce errors and improve consistency.\nBy leveraging ITSM data and workflow context, IVM helps ensure identity verification is applied exactly when and where it is needed.\nEnterprise-Ready and Scalable\nFastPass IVM is available as a cloud-based service or as an on-premises deployment, giving organizations flexibility to meet compliance, regulatory, and infrastructure requirements. It scales from organizations with a few hundred users to large enterprises and Fortune 500 companies with complex identity environments.\nProactive Defense Against Identity-Based Attacks\nBy strengthening identity verification at the service desk, FastPass IVM addresses a common attack vector before credentials are compromised. Organizations gain better visibility, improved control, and greater confidence that only verified users can trigger sensitive IT actions.\nThe result is stronger workforce identity protection, improved service desk efficiency, and a more resilient security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5e462884-f52e-4e0b-838a-100feaba91fd.jpeg","url":"https://www.softwareadvice.co.uk/software/437791/fastpass-identity-verification-manager","@type":"ListItem"},{"name":"Zygon","position":10,"description":"Zygon is an all-in-one platform that automates the management of applications and accounts for modern IT and security teams. It helps organizations orchestrate IT operations with app owners, users, or bots to streamline access requests and reviews, account provisioning, and de-provisioning.\n\nThe platform provides a comprehensive inventory of all applications and accounts used within the organization, helping eliminate shadow IT and control SaaS sprawl. Zygon automates access management across all applications, whether they support SCIM or not. It also offers integrated security and compliance features, providing visibility and control over authentication methods, allowing users to configure alerting rules, and helping enforce security policies across the entire SaaS stack.\n\nZygon seamlessly integrates with popular tools such as Google Workspace, Microsoft 365, Okta, Slack, and Microsoft Teams, allowing organizations to leverage their existing user directories and workflows. The platform also offers a powerful workflow engine and API to build custom automations, as well as a user-friendly interface for employees to request access and managers to approve them.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cecf5f83-2a8f-458e-af1a-c3d966f545e6.png","url":"https://www.softwareadvice.co.uk/software/523084/Zygon","@type":"ListItem"},{"name":"SecurEnds Identity Governance and Access Control","position":11,"description":"SecurEnds is an identity management and security compliance solution that allows businesses to automate internal audits for credential access and manage access control for users within the system. With SecurEnds, Businesses are able to access and detect identities across multiple applications, reduce cost and time of compliance audits and provide access control to the right users. Key features include identity lifecycle management, credential entitlement management, and identity risk and analytics.\n\n\nSecureEnds identity lifecycle management module allows administrators to provision and de-provision user access for both on-prem and cloud applications. Using pre-built templates and customizable attribute containers, this solution streamlines identity creation and user provisioning in just a few clicks. Pre-built integrations and connectors include Active Directory, O365, Google Suite, SAP and many other popular applications. \n\n\nWith the credential entitlement management module, administrators are able auto discover identities including authorized and unauthorized accounts. SecurEnds allows administrators to automate access audits by scheduling access review campaigns, setting custom dimensions and setting CTA reminders. In addition, SecurEnds analytics enables administrators to detect threats and chart anomalies across all applications. Using artificial intelligence and machine intelligence, SecurEnds is able to provide an overview of profile outliers based on security risk indicators and excessive privileges.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8a14ea0a-6913-4403-aadf-fcee01d3cb61.png","url":"https://www.softwareadvice.co.uk/software/93806/securends","@type":"ListItem"},{"name":"ManageEngine PAM360","position":12,"description":"ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to critical enterprise systems. It offers a unified approach to managing privileged accounts, sessions, and access workflows within an organization's IT infrastructure. This platform is suitable for digital-first enterprises, government agencies, and various industries aiming to enhance security and meet compliance requirements.\n\nThe solution includes features such as privileged account and session management, privilege elevation and delegation management, and cloud infrastructure entitlements management. PAM360 allows organizations to discover and manage privileged accounts automatically, implement just-in-time privilege elevation, monitor cloud entitlements, and apply detailed controls for endpoint privilege management. It also provides privileged user behavior analytics with AI and ML-driven anomaly detection to identify suspicious activities and potential security threats.\n\nManageEngine PAM360 includes secrets management to secure credentials for non-human entities such as applications, services, and DevOps pipelines. It offers encryption key and certificate lifecycle management to prevent service downtime and impersonation attacks. PAM360 is designed to meet compliance standards including NIST, PCI-DSS, FISMA, HIPAA, SOX, and ISO-IEC 27001, with flexible deployment options and an intuitive user interface for streamlined implementation and operation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/221979f6-48e9-4b78-ac1d-9d414890f83c.png","url":"https://www.softwareadvice.co.uk/software/361414/pam360","@type":"ListItem"},{"name":"Corma","position":13,"description":"Corma is the access management solution crafted to simplify your software ecosystem and streamline your IT operations. With Corma, managing your apps becomes easy as it centralizes all your tools, automates access reviews, and handles provisioning with ease. Whether you're welcoming new team members aboard or ensuring security through user access audits, Corma's intuitive Identity Access management solution ensures everything runs smoothly.\n\nExperience the benefits of Corma firsthand – from reducing software costs to increasing employee satisfaction. \nWith our quick and straightforward implementation process, you'll start seeing the value Corma brings to your organization within minutes. Say hello to simplified software management and goodbye to headaches – with Corma by your side, managing your apps and accesses has never been easier.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/400ee7dd-8ba6-4691-9048-96d5789382fe.png","url":"https://www.softwareadvice.co.uk/software/519580/Corma","@type":"ListItem"},{"name":"Zilla Security","position":14,"description":"Zilla Security is an early-stage security startup that provides software-as-a-service security management platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6287f105-d22c-43ca-9e34-2440c79555d9.png","url":"https://www.softwareadvice.co.uk/software/239027/zilla-security","@type":"ListItem"},{"name":"Authfy","position":15,"description":"Authfy is a SEC4U low-code platform, a company focused on Cyber Identity, which enables secure digital journeys, providing the best experience for customers: frictionless and passwordless, unifying the entire authentication path , authorization, risk assessment and fraud prevention, with zero trust and security by design","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/af4e2cf6-5baf-452a-b9cc-c1b558d50234.jpeg","url":"https://www.softwareadvice.co.uk/software/344910/authfy","@type":"ListItem"},{"name":"Amazon Cognito","position":16,"description":"Amazon Cognito is an authentication management solution that helps organizations streamline user sign in, sign up and access to web/mobile applications. The software allows businesses to provide sign-in functionality for multiple applications using various social identity providers like Facebook, Apple and Google and enterprise identity providers such as SAML 2.0, and OpenID Connect.\n\nAmazon Cognito offers white-labelling capabilities, which allow enterprises to personalize the interface using custom colours, logos and themes to establish brand identity with clients. It offers a host of features such as adaptive authentication, role-based permissions, user pool, secure access, credentials management and more. Additionally, it supports compliance with HIPAA, SOC, ISO/IEC, PCI DSS and other regulatory standards.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0dee412c-883c-487e-b6a0-d20b19892e4d.jpeg","url":"https://www.softwareadvice.co.uk/software/395552/amazon-cognito","@type":"ListItem"},{"name":"OpenText Identity Manager","position":17,"description":"NetIQ Identity Manager is an identity management and access governance solution that includes features for password synchronization, self-service password reset, and password policy enforcement. This helps ensure that users are using strong passwords and reduces the risk of password-related security incidents.\n\nIt provides organizations with the ability to manage user identities throughout their lifecycle, from onboarding to offboarding. This helps ensure that users have the appropriate access permissions at all times and reduces the risk of unauthorized access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1ae9d7e3-a043-4e0d-b27c-e81b53cc947d.jpeg","url":"https://www.softwareadvice.co.uk/software/282935/netiq-identity-manager","@type":"ListItem"},{"name":"Infisign","position":18,"description":"By embracing the Zero Trust philosophy, Infisign ensures a holistic approach to security by continuously verifying the identities and devices accessing your digital assets.\n\nWith robust Privileged Access Management (PAM) capabilities, Infisign empowers organizations to fortify their defenses against cyber threats, ensuring privileged accounts are safeguarded with precision. This includes continuous monitoring capabilities, allowing organizations to track and audit privileged user activities in real-time. In the event of a security incident or audit, organizations can easily trace and attribute actions to specific privileged users.\n\nThe platform is built on decentralized identity frameworks, offering users greater control and ownership over their digital identities. It adapts to the unique needs of every organization be it big or small, ensuring compliance with industry regulations while providing a frictionless and secure user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/08dd8cea-0d78-4fd2-892d-6a55e3c4b3f4.png","url":"https://www.softwareadvice.co.uk/software/436781/infisign","@type":"ListItem"},{"name":"Entrust Identity as a Service","position":19,"description":"Entrust Identity as a Service is a cloud-based identity and access management service that provides digital security solutions for banking, government, healthcare and enterprise organizations globally. This solution streamlines identity and access management across all applications within the enterprise environment. Key features include enterprise authentication, IT account management tools, and access control for users and groups.\n\n\nEntrust Identity as a Service deconstructs complex IT operations by implementing pre-built tools and configurations to simplify the IT provisioning and management process. From a single point of control, IT professionals can route access requests, create and delete accounts, and modify and update application access across the enterprise environment. Entrust Identity as a Service integrates with LDAP and Microsoft Active Directory to connect identity management and reduce IT workload across the entire environment. \n\n\nEntrust Identity as a Service authentication capabilities allows IT professionals to handle all authentication use cases from one secure platform. These use cases include VPN access, Desktop Log-in, Customer and Partner portals, and more. This solution also includes Rest APIs for custom application support and a Service Gateway to provide secure access and connectivity to Enterprise and SaaS applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f17b2a3c-58cf-4465-b3f9-5b7dbdd55c4b.png","url":"https://www.softwareadvice.co.uk/software/93746/intellitrust","@type":"ListItem"},{"name":"Uniqkey","position":20,"description":"Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.\n\nRecognized as the easiest tool to use, Uniqkey removes friction from employees’ daily workflows by automating time-consuming authentication and security tasks, thereby increasing productivity. Its intuitive and user-friendly interface makes Uniqkey the perfect choice for employees.\n\nUniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence.\n\nWith powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption.\n\nEngineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data.\n\nOur modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.\n\nTrusted by 500+ European businesses and ranked as a Top 50 Global Security Solution by G2, our platform is becoming Europe's preferred business password and access management solution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc919295-4126-4dc5-8e49-4cb66150e7f9.png","url":"https://www.softwareadvice.co.uk/software/425970/uniqkey","@type":"ListItem"},{"name":"Userfront","position":21,"description":"Userfront gives secure, pre-configured authentication and authorization that stays up to date automatically. Teams focus on direct setup and quality documentation to make the internet more secure. Rather than asking businesses to know and implement all the auth protocols and standards, Userfront has simple APIs and SDKs that work automatically. The solution gives security defaults that far exceed industry standards, configured automatically to remove the chance that something is misconfigured. \n\nIt is a developer-focused platform designed to make setup, administration, and maintenance easy for developers. Userfront has simple pricing and includes many enterprise-grade features like SSO and SAML in all of its tiers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19a37c48-d332-4304-9f75-1c876c41039c.png","url":"https://www.softwareadvice.co.uk/software/260196/userfront","@type":"ListItem"},{"name":"Access Rights Manager","position":22,"description":"Access Rights Manager is a Windows-based access management tool that assists network security teams with directory monitoring and custom reporting. It is primarily designed to scan file servers, provide role-specific templates on SharePoint and prevent suspicious account activity. Key features of Access Rights Manager include the identification of insecure accounts, user permissions management, regulatory compliance and auditing.\n\nThe Microsoft Exchange monitoring feature helps users detect unauthorized access and tracks change to mailboxes and public folders. With the Windows File Share auditing functionality, firms can visualize permissions and prevent breaches of sensitive data. Further, the cloud-based self-service permission portal allows data owners to access information without seeking clearance from the administrator.\n\nAccess Rights Manager generates audit-ready reports. Support is provided via phone and an online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8dfb08eb-830d-4450-b895-96c4a74325bf.png","url":"https://www.softwareadvice.co.uk/software/412478/access-rights-manager","@type":"ListItem"},{"name":"AWS Organizations","position":23,"description":"AWS Organizations is an access solution that enables users to treat multiple AWS accounts as a single account. Users can create new accounts, grant permissions, and manage policies across multiple AWS accounts. With AWS Organizations, users can easily manage high-level service control policies for groups of users.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/48a79712-2de0-4ec6-baff-c413d18bffb3.jpeg","url":"https://www.softwareadvice.co.uk/software/396514/aws-organizations","@type":"ListItem"},{"name":"Heimdal Application Control","position":24,"description":"Heimdal Application Control is an application management and user rights curation solution that takes a novel approach to access governance. It follows the AC-over-PAM (Application Control over Privileged Access Management) model, which entails the use of micro-controllers. This further enhances an elevated session with additional security layers that prevent insider threats and other malicious attacks.\nModular and hassle-free, Heimdal Application Controls empowers sysadmins to take control of what programs execute themselves within the company network. This is made possible by features such as creating all-encompassing rule-based frameworks, streamlining auto-dismissal or auto-approval flows, and enforcing individual access rights according to Active Directory groups. \nWith Heimdal Application Control, app whitelisting and blacklisting can be achieved with just one click of a button. Once deployed, this toolkit will bar solicitants from accessing any applications that have been previously blocked by IT administrators. Malicious apps can potentially damage the machine or leak malicious software into your corporate network, and our solution is created to prevent that.\nHeimdal Application Control’s innovation stems from its ability to perfectly pair with a privileged access management solution. This ensures complete access governance within your enterprise network, as it blocks both malicious programs from executing themselves, as well as malicious insiders or third parties from wreaking havoc from overly-privileged accounts. \nEnforcing clear regulations before allowing elevated sessions to take place prevents the execution of rootkits or blocks a potential inside threat actor’s access to sensitive memory areas. The latter is used in the lateral movement of a malware strain inside a corporate system, so AC-over-PAM is the new industry standard for access governance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b0a2e552-8b3d-4c2f-b84f-e337e7f50c32.png","url":"https://www.softwareadvice.co.uk/software/242920/heimdal-application-control","@type":"ListItem"},{"name":"Teleport","position":25,"description":"Teleport is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications.\n\nTeleport provides access control for all your cloud resources in one place. It simplifies the management of SSH keys and passwords, as well as other credentials such as SSL/TLS certificates.\n\nTeleport works with Kubernetes clusters on AWS or GKE, but also lets you manage clusters on DigitalOcean or any other host you can connect to via SSH. It also supports the management of static web servers running NGINX or Apache2.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adfb3088-111b-407a-9358-515210336eaf.png","url":"https://www.softwareadvice.co.uk/software/361499/teleport","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4665/access-governance/software?page=2#itemlist","numberOfItems":25}
</script>
