Introducing G2.ai, the future of software buying.Try now

Best Identity and Access Management (IAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity and access management (IAM) software helps companies protect their systems from unauthorized access or misuse by only allowing authenticated, authorized users (typically employees, based on job roles) to access specific, protected company systems and data. IT administrators leverage the software to quickly provision, deprovision, and change user identities and the corresponding user access rights at scale.

IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees are in compliance with company policies and regulations. Many IAM solutions include single sign-on (SSO) and password manager features. For employees, once users authenticate by signing into their accounts or using other multi-factor authentication methods, they are granted limited access to company systems allowed by their user type to complete their typical job functions.

Additionally, many IAM products are now being integrated with generative artificial intelligence (AI) features. These AI features allow IAM products to automate routine tasks that can be cumbersome for IT and InfoSec teams while predicting identity-related misconfigurations and recommending various access controls.

IAM software differs from privileged access management (PAM) software. IAM software is used to authorize, authenticate, and grant specific access to everyday users, such as company employees. However, PAM software is used to provide administrative or superusers with granular access to business-critical assets and privileged credentials. IAM software also differs from customer identity and access management (CIAM) software, which provides a company’s customers, as opposed to employees, with secured access to customer applications.

To qualify for inclusion in the Identity and Access Management (IAM) category, a product must:

Provision and deprovision user identities
Assign access based on individual role, group membership, and other factors
Enforce user access rights based on permissions
Verify user identity with authentication, which may include multi-factor authentication methods
Integrate with directories that house employee data
Show More
Show Less

Featured Identity and Access Management (IAM) Software At A Glance

Free Plan Available:
P0 Security
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Identity and Access Management (IAM) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
188 Listings in Identity and Access Management (IAM) Available
(3,729)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a cloud-based identity and access management platform that provides centralized control of user authentication and authorization across various systems and applications, compatible with multiple platforms and operating systems.
    • Reviewers appreciate JumpCloud's user-friendly interface, its ability to manage multiple operating systems from one platform, its scalability, and its focus on security and compliance with features such as multi-factor authentication and group-based security policies.
    • Users mentioned some drawbacks of JumpCloud, such as its dependence on a stable internet connection, limitations in its reporting capabilities, occasional problems with software deployment and policy enforcement, and issues with the mobile admin console.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    922
    Device Management
    712
    Integrations
    528
    Security
    528
    User Management
    449
    Cons
    Missing Features
    359
    Improvement Needed
    290
    Limited Features
    228
    UX Improvement
    162
    Limitations
    153
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Tracking
    Average: 8.6
    9.0
    User provisioning
    Average: 9.0
    8.2
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    36,621 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    918 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a cloud-based identity and access management platform that provides centralized control of user authentication and authorization across various systems and applications, compatible with multiple platforms and operating systems.
  • Reviewers appreciate JumpCloud's user-friendly interface, its ability to manage multiple operating systems from one platform, its scalability, and its focus on security and compliance with features such as multi-factor authentication and group-based security policies.
  • Users mentioned some drawbacks of JumpCloud, such as its dependence on a stable internet connection, limitations in its reporting capabilities, occasional problems with software deployment and policy enforcement, and issues with the mobile admin console.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
922
Device Management
712
Integrations
528
Security
528
User Management
449
Cons
Missing Features
359
Improvement Needed
290
Limited Features
228
UX Improvement
162
Limitations
153
JumpCloud features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.4
Tracking
Average: 8.6
9.0
User provisioning
Average: 9.0
8.2
On-premises solution
Average: 8.1
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
36,621 Twitter followers
LinkedIn® Page
www.linkedin.com
918 employees on LinkedIn®
(1,033)4.5 out of 5
1st Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Okta
Save to My Lists
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    172
    Security
    125
    Single Sign-On
    95
    Authentication
    92
    Easy Access
    91
    Cons
    Authentication Issues
    64
    Login Issues
    44
    Frequent Authentication
    30
    Expensive
    27
    Complex Setup
    26
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.0
    9.1
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,545 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 40% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
172
Security
125
Single Sign-On
95
Authentication
92
Easy Access
91
Cons
Authentication Issues
64
Login Issues
44
Frequent Authentication
30
Expensive
27
Complex Setup
26
Okta features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
9.1
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.0
9.1
On-premises solution
Average: 8.1
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,545 Twitter followers
LinkedIn® Page
www.linkedin.com
6,682 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(11,757)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Rippling
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Simplify IT with device management, software access, and compliance monitoring, all from one das

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Mid-Market
    • 31% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Rippling is a software application that provides payroll, time tracking, and HR management features.
    • Users like the user-friendly interface, the ease of navigation, the detailed information about paychecks, the ability to manage accounts, and the responsiveness of the support team.
    • Reviewers mentioned that some forms are repetitive, the initial implementation phase can be lengthy, and some features can be hard to find or understand.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rippling Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6,738
    Intuitive
    5,082
    Simple
    4,166
    User Interface
    3,761
    Easy Access
    3,673
    Cons
    Missing Features
    1,250
    Learning Curve
    842
    Not User-Friendly
    836
    Navigation Difficulty
    779
    Limited Features
    768
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rippling features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.0
    9.2
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rippling
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @Rippling
    11,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Simplify IT with device management, software access, and compliance monitoring, all from one das

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Mid-Market
  • 31% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Rippling is a software application that provides payroll, time tracking, and HR management features.
  • Users like the user-friendly interface, the ease of navigation, the detailed information about paychecks, the ability to manage accounts, and the responsiveness of the support team.
  • Reviewers mentioned that some forms are repetitive, the initial implementation phase can be lengthy, and some features can be hard to find or understand.
Rippling Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6,738
Intuitive
5,082
Simple
4,166
User Interface
3,761
Easy Access
3,673
Cons
Missing Features
1,250
Learning Curve
842
Not User-Friendly
836
Navigation Difficulty
779
Limited Features
768
Rippling features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.1
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.0
9.2
On-premises solution
Average: 8.1
Seller Details
Seller
Rippling
Company Website
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@Rippling
11,550 Twitter followers
LinkedIn® Page
www.linkedin.com
6,456 employees on LinkedIn®
(789)4.5 out of 5
8th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Microsoft Entra ID
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 39% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    76
    Security
    69
    Identity Management
    54
    Single Sign-On
    48
    SSO (Single Sign-On)
    41
    Cons
    Expensive
    33
    Cost
    20
    Integration Issues
    20
    Missing Features
    17
    Complexity
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Tracking
    Average: 8.6
    9.0
    User provisioning
    Average: 9.0
    8.5
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,263,534 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 39% Enterprise
  • 38% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
76
Security
69
Identity Management
54
Single Sign-On
48
SSO (Single Sign-On)
41
Cons
Expensive
33
Cost
20
Integration Issues
20
Missing Features
17
Complexity
16
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.8
Tracking
Average: 8.6
9.0
User provisioning
Average: 9.0
8.5
On-premises solution
Average: 8.1
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,263,534 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a us

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Vertrified Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Easy Management
    6
    Ease of Use
    5
    Integrations
    5
    Intuitive
    4
    Cons
    Difficult Learning
    7
    Lack of Information
    5
    Learning Curve
    4
    Complexity
    3
    Expensive
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Vertrified Access features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.0
    9.5
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,219,847 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a us

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Mid-Market
  • 32% Small-Business
AWS Vertrified Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Easy Management
6
Ease of Use
5
Integrations
5
Intuitive
4
Cons
Difficult Learning
7
Lack of Information
5
Learning Curve
4
Complexity
3
Expensive
2
AWS Vertrified Access features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.3
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.0
9.5
On-premises solution
Average: 8.1
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,219,847 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(3,773)4.5 out of 5
Optimized for quick response
6th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 35% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Salesforce Platform is a customizable and scalable tool that enables automation, real-time data access, and seamless integration with other tools, designed for managing customer data and workflow processes.
    • Reviewers like the platform's flexibility, scalability, and integration capabilities, its low-code features for easy app building, and the robust ecosystem that supports strong collaboration and productivity.
    • Reviewers mentioned that the platform can be complex and challenging to navigate initially, with a steep learning curve for customization and setup, and some advanced features may require technical expertise or additional costs for full functionality.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1,514
    Features
    728
    Customizability
    615
    Customization
    612
    Customization Options
    575
    Cons
    Learning Curve
    528
    Complexity
    480
    Expensive
    452
    Difficult Learning
    379
    Missing Features
    372
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Tracking
    Average: 8.6
    8.7
    User provisioning
    Average: 9.0
    8.7
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    580,231 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86,064 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 35% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Salesforce Platform is a customizable and scalable tool that enables automation, real-time data access, and seamless integration with other tools, designed for managing customer data and workflow processes.
  • Reviewers like the platform's flexibility, scalability, and integration capabilities, its low-code features for easy app building, and the robust ecosystem that supports strong collaboration and productivity.
  • Reviewers mentioned that the platform can be complex and challenging to navigate initially, with a steep learning curve for customization and setup, and some advanced features may require technical expertise or additional costs for full functionality.
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1,514
Features
728
Customizability
615
Customization
612
Customization Options
575
Cons
Learning Curve
528
Complexity
480
Expensive
452
Difficult Learning
379
Missing Features
372
Salesforce Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.9
Tracking
Average: 8.6
8.7
User provisioning
Average: 9.0
8.7
On-premises solution
Average: 8.1
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
580,231 Twitter followers
LinkedIn® Page
www.linkedin.com
86,064 employees on LinkedIn®
(28)4.6 out of 5
View top Consulting Services for Oracle Identity Cloud Service
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs.

    Users
    No information available
    Industries
    • Automotive
    Market Segment
    • 46% Mid-Market
    • 39% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Oracle Identity Cloud Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Ease of Use
    1
    Easy Management
    1
    Flexibility
    1
    Intuitive
    1
    Cons
    Difficult Learning
    1
    Implementation Difficulty
    1
    Integration Issues
    1
    Lack of Expertise
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.2
    Tracking
    Average: 8.6
    8.9
    User provisioning
    Average: 9.0
    8.8
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,678 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195,794 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs.

Users
No information available
Industries
  • Automotive
Market Segment
  • 46% Mid-Market
  • 39% Enterprise
Oracle Identity Cloud Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Ease of Use
1
Easy Management
1
Flexibility
1
Intuitive
1
Cons
Difficult Learning
1
Implementation Difficulty
1
Integration Issues
1
Lack of Expertise
1
Limited Customization
1
Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.2
Tracking
Average: 8.6
8.9
User provisioning
Average: 9.0
8.8
On-premises solution
Average: 8.1
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,678 Twitter followers
LinkedIn® Page
www.linkedin.com
195,794 employees on LinkedIn®
Ownership
NYSE:ORCL
(428)4.5 out of 5
Optimized for quick response
12th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Ease of Use
    21
    Authentication
    15
    Authentication Ease
    13
    Reliability
    11
    Cons
    Authentication Issues
    8
    Access Limitations
    7
    Expensive
    7
    Internet Dependency
    6
    Complexity
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Tracking
    Average: 8.6
    9.6
    User provisioning
    Average: 9.0
    8.5
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    723,927 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Ease of Use
21
Authentication
15
Authentication Ease
13
Reliability
11
Cons
Authentication Issues
8
Access Limitations
7
Expensive
7
Internet Dependency
6
Complexity
5
Cisco Duo features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.1
Tracking
Average: 8.6
9.6
User provisioning
Average: 9.0
8.5
On-premises solution
Average: 8.1
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
723,927 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
(160)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Enterprise
    • 42% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a product that centralizes user access, tracks consent, and logs activity, providing secure authentication and compliance reporting.
    • Users like the product's scalability and flexibility in managing a large user base, its robust authentication mechanisms, and its detailed monitoring and analytics for auditing and compliance.
    • Users reported that the initial setup can be complex, the admin dashboard is sometimes slow, and the documentation can be too technical for new users.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    46
    Ease of Use
    32
    Authentication
    27
    Single Sign-On
    22
    Features
    21
    Cons
    Complex Setup
    23
    Difficult Learning
    21
    Complexity
    20
    Complex Administration
    17
    Difficult Setup
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Tracking
    Average: 8.6
    8.4
    User provisioning
    Average: 9.0
    8.3
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    710,904 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Enterprise
  • 42% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a product that centralizes user access, tracks consent, and logs activity, providing secure authentication and compliance reporting.
  • Users like the product's scalability and flexibility in managing a large user base, its robust authentication mechanisms, and its detailed monitoring and analytics for auditing and compliance.
  • Users reported that the initial setup can be complex, the admin dashboard is sometimes slow, and the documentation can be too technical for new users.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
46
Ease of Use
32
Authentication
27
Single Sign-On
22
Features
21
Cons
Complex Setup
23
Difficult Learning
21
Complexity
20
Complex Administration
17
Difficult Setup
15
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.2
8.4
Tracking
Average: 8.6
8.4
User provisioning
Average: 9.0
8.3
On-premises solution
Average: 8.1
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
710,904 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(628)4.5 out of 5
Optimized for quick response
4th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
20% Off: $2.87 user / month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

    Users
    • CEO
    • CTO
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 72% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NordPass Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    231
    Security
    166
    Password Management
    140
    Sharing Ease
    138
    Intuitive
    131
    Cons
    Password Management
    103
    Password Issues
    80
    Login Issues
    65
    Autofill Issues
    54
    Browser Extension Issues
    51
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NordPass Business features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Tracking
    Average: 8.6
    8.5
    User provisioning
    Average: 9.0
    7.8
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Global
    Twitter
    @NordPass
    9,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,755 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

Users
  • CEO
  • CTO
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 72% Small-Business
  • 25% Mid-Market
NordPass Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
231
Security
166
Password Management
140
Sharing Ease
138
Intuitive
131
Cons
Password Management
103
Password Issues
80
Login Issues
65
Autofill Issues
54
Browser Extension Issues
51
NordPass Business features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Tracking
Average: 8.6
8.5
User provisioning
Average: 9.0
7.8
On-premises solution
Average: 8.1
Seller Details
Company Website
Year Founded
2012
HQ Location
Global
Twitter
@NordPass
9,480 Twitter followers
LinkedIn® Page
www.linkedin.com
1,755 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permiss

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 41% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Identity and Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    5
    Security
    5
    Ease of Use
    4
    Easy Management
    3
    Policy Management
    3
    Cons
    Access Permissions
    2
    Complexity
    2
    Missing Features
    2
    Notification Issues
    2
    Poor Interface Design
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.2
    Tracking
    Average: 8.6
    8.7
    User provisioning
    Average: 9.0
    8.3
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,219,847 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permiss

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 41% Enterprise
  • 31% Mid-Market
AWS Identity and Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
5
Security
5
Ease of Use
4
Easy Management
3
Policy Management
3
Cons
Access Permissions
2
Complexity
2
Missing Features
2
Notification Issues
2
Poor Interface Design
2
AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.2
Tracking
Average: 8.6
8.7
User provisioning
Average: 9.0
8.3
On-premises solution
Average: 8.1
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,219,847 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(1,539)4.6 out of 5
13th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for 1Password
Save to My Lists
100% Off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 175,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    196
    Security
    166
    Password Management
    86
    Intuitive
    77
    Easy Access
    66
    Cons
    Password Management
    67
    Expensive
    58
    Login Issues
    34
    Cost
    33
    Learning Curve
    31
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.0
    9.2
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    139,776 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 175,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 32% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
196
Security
166
Password Management
86
Intuitive
77
Easy Access
66
Cons
Password Management
67
Expensive
58
Login Issues
34
Cost
33
Learning Curve
31
1Password features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
9.4
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.0
9.2
On-premises solution
Average: 8.1
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
139,776 Twitter followers
LinkedIn® Page
www.linkedin.com
2,604 employees on LinkedIn®
(147)4.5 out of 5
15th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 80% Enterprise
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SailPoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Features
    20
    Customer Support
    15
    Integrations
    15
    Security
    15
    Cons
    Poor Customer Support
    14
    Improvement Needed
    12
    Expensive
    11
    Missing Features
    10
    Cost
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SailPoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    7.2
    Tracking
    Average: 8.6
    8.8
    User provisioning
    Average: 9.0
    8.6
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SailPoint
    Company Website
    Year Founded
    2004
    HQ Location
    Austin, TX
    Twitter
    @SailPoint
    15,072 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,235 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 80% Enterprise
  • 14% Mid-Market
SailPoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Features
20
Customer Support
15
Integrations
15
Security
15
Cons
Poor Customer Support
14
Improvement Needed
12
Expensive
11
Missing Features
10
Cost
9
SailPoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
7.2
Tracking
Average: 8.6
8.8
User provisioning
Average: 9.0
8.6
On-premises solution
Average: 8.1
Seller Details
Seller
SailPoint
Company Website
Year Founded
2004
HQ Location
Austin, TX
Twitter
@SailPoint
15,072 Twitter followers
LinkedIn® Page
www.linkedin.com
3,235 employees on LinkedIn®
(80)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Identity and Access Management (IAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Descope Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    31
    Ease of Use
    31
    Implementation Ease
    22
    Authentication
    21
    Easy Setup
    20
    Cons
    Complex Setup
    6
    Missing Features
    6
    Poor Documentation
    5
    Difficult Learning
    4
    Lack of Information
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Descope features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Tracking
    Average: 8.6
    9.8
    User provisioning
    Average: 9.0
    10.0
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Descope
    Company Website
    Year Founded
    2022
    HQ Location
    Los Altos, California
    Twitter
    @descopeinc
    563 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Descope is a drag & drop customer authentication and identity management platform. Our no / low code CIAM solution helps organizations easily create and customize their entire user journey using v

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
Descope Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
31
Ease of Use
31
Implementation Ease
22
Authentication
21
Easy Setup
20
Cons
Complex Setup
6
Missing Features
6
Poor Documentation
5
Difficult Learning
4
Lack of Information
4
Descope features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.5
Tracking
Average: 8.6
9.8
User provisioning
Average: 9.0
10.0
On-premises solution
Average: 8.1
Seller Details
Seller
Descope
Company Website
Year Founded
2022
HQ Location
Los Altos, California
Twitter
@descopeinc
563 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

    Users
    • Software Engineer
    • Software Developer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Auth0 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Security
    30
    Authentication
    23
    Integrations
    23
    Easy Integrations
    22
    Cons
    Expensive
    15
    Cost
    10
    Pricing Issues
    9
    Difficult Learning
    8
    Expensive Pricing
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auth0 features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Tracking
    Average: 8.6
    8.8
    User provisioning
    Average: 9.0
    8.8
    On-premises solution
    Average: 8.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,545 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and se

Users
  • Software Engineer
  • Software Developer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 30% Mid-Market
Auth0 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Security
30
Authentication
23
Integrations
23
Easy Integrations
22
Cons
Expensive
15
Cost
10
Pricing Issues
9
Difficult Learning
8
Expensive Pricing
8
Auth0 features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
9.0
Tracking
Average: 8.6
8.8
User provisioning
Average: 9.0
8.8
On-premises solution
Average: 8.1
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,545 Twitter followers
LinkedIn® Page
www.linkedin.com
6,682 employees on LinkedIn®

Learn More About Identity and Access Management (IAM) Software

What is Identity and Access Management (IAM) Software?

Companies use identity and access management (IAM) software to both enforce their security controls regarding who has access to corporate assets and to promote worker productivity with ease of access to the tools they need to do their jobs. IAM software achieves this by allowing only authorized and authenticated users, such as employees, contractors, and devices, to access corporate resources at their appropriate permission level based on predetermined policy-based controls. 

Using IAM software, company administrators can quickly provision, deprovision, or change user identities and access rights to corporate assets at scale. Each user is granted the right level of access permissions based on their user or group membership type. This makes it easier for security teams to manage who has access to what accounts at scale, and for end users to quickly gain access to the tools they need to do their jobs instead of waiting for their individual accounts to be provisioned one by one. For example, a newly promoted departmental leader at a company may need permissions to fully access the proprietary data stored within an application. This can easily be granted to them due to their management group membership, while a junior-level employee would not need that kind of granular access, so they would only be permissioned to view non sensitive data stored within the application. IAM software also tracks user activity, enabling administrators to confirm that users are accessing corporate assets in compliance with company policies.

Using IAM software and utilizing policy-based controls to enforce least privilege strategies, companies can protect against unauthorized access from both external actors like hackers and non permissioned internal users (insider threats) who have insufficient access level permissions. IAM software is used as an important component of a company’s zero-trust, least-privilege security model, where all users’ identities are verified prior to granting access to corporate resources. This is different from prior security models that enforced perimeter security where once a user is inside the corporate network, they are granted free access and movement across the network, and not required to be authenticated again to use other applications.

What Does IAM Stand For?

IAM, sometimes also listed as IdAM, stands for identity and access management. IAM software is sometimes also referred to as workforce identity or employee identity management. Other acronyms related to IAM include CIAM for customer identity and access management (CIAM) software which is used for customer-related identity management. Similarly, for government-related identity products, the acronym ICAM stands for Identity, credential, and access management. Another acronym, IDaaS, stands for identity as a service.

What are the Common Features of Identity and Access Management (IAM) Software?

The following are some core features within IAM software:

Authentication: IAM providers offer multi-factor authentication (MFA) methods for users to prove their identity prior to being granted access to corporate resources. MFA requires more than a single authentication factor, such as only a username and password. Authentication factors can include one-time passcodes (OTPs), software tokens, mobile-push, hardware tokens, and more. More advanced authentication methods include biometric authentication and passwordless authentication. 

More recently, IAM providers are utilizing risk-based authentication (RBA) methods, also known as contextual authentication, intelligent MFA, or adaptive MFA, which analyzes real-time information about users, such as their IP addresses, devices, and behaviors to continually verify their identity. 

Identity lifecycle management or user provisioning and deprovisioning: IAM software providers offer administrators the ability to manage the lifecycle of an identity—from quickly provisioning to deprovisioning, along with user changes including attributes, roles, permissions, and other entitlements. Some IAM providers also offer a universal directory.

Directory: IAM providers will either integrate with existing directory providers or offer a universal directory service.

Single sign-on (SSO): IAM software provides SSO functionality to enable end users to access their business applications all in one place and requiring them to authenticate once.

User activity monitoring: IAM software enables administrators to track user activity, including anomalous activity. This kind of auditing is to ensure compliance with secure access control policies. IAM solutions often provide standard reports for this.

What are the Benefits of Identity and Access Management (IAM) Software?

Security: The main benefit of implementing identity and access manager software is for improved security. IAM software manages access governance, allowing only verified, authorized, and permissioned users to access company assets. This helps mitigate risks from external hackers or insider threats.

Productivity or enabling the workforce: In addition to improved security, companies that deploy IAM software to streamline the login experience, may lead to productivity gains with users. Having a simple to use security product with SSO requiring only one login and that also organizes the user’s corporate applications and accounts all in one place can save the user time and frustration. 

Regulatory compliance: Many global governmental or industry regulations require companies to have security controls to be in place. Identity management is a major component of a well-rounded information security program.

Who Uses Identity and Access Management (IAM) Software?

Information security (infosec) professionals: Infosec professionals use IAM software as a foundational component of their security program.

IT Administrators: IT admins may be responsible for managing IAM software, especially as it relates to provisioning and deprovisioning users.

End users and devices: End users such as employees or contractors use IAM software in their day-to-day work activities to access corporate assets needed to do their jobs. Devices such as internet of things (IoT) devices require the validity of their identity in order to access corporate resources, including other IoT devices.

What are the Alternatives to Identity and Access Management (IAM) Software?

Alternatives to IAM solutions can replace this type of software, either partially or completely include:

Single sign-on (SSO) software: SSO software, which is a component of a complete IAM software solution, is an authentication tool that allows users to sign into multiple applications or databases with a single set of credentials. SSO software will not have identity governance and user lifecycle management features that an IAM solution would provide.

Multi-factor authentication (MFA) software: MFA, which is a component of a complete IAM software solution, is used to have users prove their identity in two or more ways before granting them access privileges to corporate accounts. There are many types of authentication factors above the standard single factor of login credentials like usernames and passwords, including something the user has like a mobile device or security token, something the user is, such as a scan of their faceprint or fingerprint, or somewhere the user is, like their geographical location and IP address. Newer forms of MFA include risk-based authentication and passwordless authentication.

Password manager software: Password manager software, or password management software, stores a user's individual passwords through either an encrypted vault downloaded to a user’s computer or mobile device, or digitally through browser plugins or extensions. The passwords stored in this software are managed by the user, not by a corporate administrator.

Software Related to Identity and Access Management (IAM) Software

Related solutions that can be used together with IAM software include many types of identity management software:

Customer identity and access management (CIAM) software: CIAM software is similar to IAM software, but used for customer identities instead of workforce identities like employees, contractors, and corporate devices. 

Privileged access management (PAM) software: PAM software helps companies protect the most critical IT resources by ensuring the credentials of their privileged accounts, such as admin accounts are only accessed by those with proper permissions to do so. When users access these privileged accounts, they must check in and check out and are often monitored during the time they are using the privileged account. PAM solutions are used in conjunction with IAM software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. 

User provisioning and governance tools: User provisioning and governance tools enable companies to manage user account identities throughout their lifecycle, including provisioning and deprovisioning. These solutions are often deployed on-premises, but many tools are offering cloud-based solutions, as well. 

Cloud directory services software: Similar to user provisioning and governance tools, cloud directory services software enables companies to manage user identities throughout their lifecycle, including provisioning and deprovisioning, in a cloud-deployed manner. Companies use these tools as they transition away from traditional on premises or locally operating identity management software to cloud services and SaaS applications. 

Challenges with Identity and Access Management (IAM) Software

Identity management solutions and IAM systems can come with their own set of challenges. 

Policy and group management: Managing corporate access policies and group management is a company policy-related issue, not necessarily a technical one. It can get overwhelming for IAM administrators when companies have undefined or even conflicting policies as to which users have access to what resources. Administrators may be asked by leadership to provide users with much higher levels of access than their policy or group access control would normally allow, thus introducing risks into the environment.

Identity for cloud vs. on-premises applications: Depending on the company’s technology stack, businesses may have a mix of both on-premises and cloud-based applications and resources. Companies must ensure that their IAM solution has connectors to the types of systems they need support for, especially for hybrid IT environments.

Insufficient MFA methods: It is important that the MFA component of the identity program is strong to prevent unauthorized use which can lead to data breaches. Many IAM providers are moving away from less secure MFA methods, such as email one-time-passcodes to stronger authentication methods like risk-based authentication or contextual authentication.

How to Buy Identity and Access Management (IAM) Software

Requirements Gathering (RFI/RFP) for Identity and Access Management (IAM) Software

When gathering and prioritizing the company's requirements, it is important to consider the following factors.

Ease for end users: In order for IAM software to be effective, end users have to actually use it. The IAM solution must be easy to use by the end user and become part of their everyday routine. 

Authentication methods: Are there limitations on the types of authentication factors that the company’s employees, contractors, and devices can use? For example, employees may be able to use authentication methods such as hardware tokens and biometrics, while temporary contractors might rely on in-app mobile pushes or OTPs sent via email, SMS, or phone. Additionally, if employees in a manufacturing facility or healthcare unit cannot carry a mobile phone with them, authentication factors requiring a mobile device may not be suitable.

Regional considerations: Is the company global? Does the IAM solution need to support multiple languages, use cases, and adhere to local data protection regulations? Businesses must ensure the IAM provider can accommodate the company’s geographic and regional-based needs.

Integrations: Companies should determine which integrations are important to them. The most critical integration would likely be the user directory solution, such as an HR system, if a directory is not provided by or being used within the IAM solution.

Timeline: The company must decide how quickly they need to implement the solution.

Level of support: Buyers should know if they require high-quality support or if they prefer implementing the solution in house.

Compare Identity and Access Management (IAM) Software Products

Create a long list

There are many providers of IAM software. The best way to begin narrowing the search for products that would work well for the company would be to start by company segment size, such as small, medium, or enterprise-size businesses. By visiting the Identity and Access Management (IAM) software page on G2.com, buyers can filter solutions by market segment using the left-hand filter radio buttons.

Create a short list

After looking through IAM solutions for particular company size, buyers should ensure it meets the authentication and regional needs. If a specific language is a requirement, buyers can filter solutions by language by visiting the Identity and Access Management (IAM) software page on G2.com. For other requirements, such as how easy it is to use, the “Easiest to use” section of the Identity and Access Management (IAM) software page on G2 helps compare options. Users can further narrow the selection by reading user reviews, checking the product’s ranking on the G2 Grid® report for the Identity and Access Management (IAM) software category, and reading other related IAM-related resources.

Conduct demos

At each demo, buyers must be sure to ask the same questions and use case scenarios to best evaluate each product. Potential buyers can contact many vendors directly on g2.com to request demos by selecting the “Get a quote” button. 

Selection of Identity and Access Management (IAM) Software

Choose a selection team

The selection team should include the day-to-day administrator of this product, who is likely an information security or related cybersecurity professional or an IT administrator professional. Companies may also consider having someone from HR join the selection committee to provide context regarding new hire onboarding and employee offboarding, as it relates to the user provisioning or deprovisioning aspect of IAM software. And lastly, it is important to include a typical day-to-day end user to ensure that the end user experience is easy to use and can be widely adopted by the workforce.

Negotiation

When negotiating the contract, buyers must consider pricing, implementation, and support. Typically longer length contracts and larger license counts can improve price discounting. 

Final decision

The final decision maker should likely be the day-to-day administrator of the solution, likely an information security professional or an IT administrator professional, with input from other stakeholders on the selection team. Prior to purchasing an IAM solution, buyers should check if they can get a trial period to test with a small number of users before going all in on the product. If the tool is well received by end users and administrators, businesses can feel more confident in their purchase.

Which IAM platform is best for managing user roles?

When choosing an IAM platform that's best for managing user roles, I would consider some of these popular IAM platforms:

These platforms are known for their robust features and efficient management of user roles.

What is the best identity management tool with multi-factor authentication?

If you're seeking identity management tools with multi-factor authentication, here are some top options to consider:

  • Microsoft Entra ID: excels with its risk-based conditional access that can dynamically require different authentication factors based on login patterns, device health, and location signals.
  • JumpCloud: provides a cloud-based directory platform that manages user identities, devices, and access across various systems. It supports multiple operating systems and offers features like SSO, MFA, and device management, catering well to hybrid and remote work environments.
  • Okta: offers robust identity management features, including single sign-on (SSO) and multi-factor authentication (MFA). It’s highly scalable and integrates well with various applications