Best Customer Identity and Access Management Software

Customer identity and access management (CIAM) software helps create consumer identity accounts and directories. These accounts can be added, altered, or deleted, allowing the business to control the information a customer can access. CIAM tools are used to strengthen both customer privacy and business data security. If a vendor supplies multiple products, these tools can also improve the customer experience by creating simplified access across multiple channels.

There is some crossover between CIAM solutions and privileged access management (PAM) solutions. While CIAM solutions facilitate the creation and modification of customer or consumer identities, PAM offerings are more geared toward internal employee permissions and business-to-business relations. They help create accounts to give internal users access to applications, networks, and sensitive information.

To qualify for inclusion in the Customer Identity and Access Management category, a product must:

  • Provide customer identity lifecycle management features
  • Secure customer data through individualized identities
  • Scale to support growing a customer base
G2 Grid® for Customer Identity and Access Management
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
content
Star Rating

Customer Identity and Access Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Customer Identity and Access Management Software

Results: 82
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 82
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.

    Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.

    Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access management, intelligent API security, directory and data governance capabilities. Visit www.pingidentity.com.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.

    Salesforce App Cloud provides an out-of-the-box identity solution using open standards, including SAML, OpenID Connect, OAuth, and SCIM. Now IT can manage apps, users, and data sharing with simplicity and transparency.

    Rippling is the first way for businesses to manage their HR & IT in one system — from employee payroll and benefits, to computers and software. Want to hire someone, for example? Just click a button, and Rippling can instantly: add new hires to your payroll and benefits, create their email, ship their work computer, and even create their user account across all your cloud apps, like Gmail, Slack, and Microsoft Office.

    The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement

    Auth0 is a cloud service that provides a set of unified APIs and tools that enables single sign-on and user management for any application, API or IoT device, it allows connections to any identity provider from social to enterprise to custom username/password databases.

    Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.

    Only Avatier delivers private instance, cloud-independent or on-premise Identity Management platforms in just minutes. This enables organizations to scale faster, innovate quicker, conquer and embrace change, to dominate their competition. Avatier's customer identity and access management platform integrates all back-office business applications and employee assets together and manages them as one. Our complete suite of integrated IDM solutions, called Identity Anywhere, are delivered and managed using the latest Docker container technology providing maximum flexibility, scale, compliance, and security to our customers.

    Amazon Cognito lets you add user sign-up and sign-in and access control to your web and mobile apps quickly and easily. It scales to millions of users, and supports sign-in with social identity providers such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0.

    Azure Active Directory B2C offers consumer identity and access management in the cloud, improves consumer connections, protects their identities, and more.

    Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others. With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.

    So much more than SSO – Cloud Identity Service is a complete Identity and Access Management as a Service (IDaaS). Onboard SaaS apps 100x faster Cloud Identity Service has onboarded SaaS applications 100x faster than legacy on premises IAM environments and can integrate nearly any number and type of identity repositories in 5 easy steps. Reduce IAM costs by up to 60% Eliminate on-premise hardware and software deployment costs, as well as upgrade and maintenance expenses. Cut deployment time up to 75% Without requiring clients to hire and train specialized IAM staff, Cloud Identity Service is deployed up to 75% faster than off-the-shelf identity and access management systems.

    BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security. Features include: - Privileged Access Control: Enforce least privilege by giving users the right level of access. - Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections. - Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway. - Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials. - Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere. - Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.

    Janrain makes it easy to know your customers and personalize every interaction. Our Customer Identity Management Platform helps companies build a unified view of their customers across all devices by collecting accurate customer profile data to power personalized marketing. The platform encompasses social login, registration, customer profile data storage, customer insights, single sign-on, and engagement. Janrain powers customer identity management for brands like Pfizer, AMC, Samsung, Whole Foods, Fox News, Philips, Marvel, Mattel and Dr. Pepper.

    HashiCorp Vault enables organizations to securely secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data across multiple clouds. Vault secrets management centrally manages and enforces access to secrets and systems based on a trusted a trusted source of application and user identity. Governance features enable security teams to control these identities for different teams. Additionally, Vault handles multi-datacenter replication and disaster recovery so you can maintain continuous and agile application delivery.

    Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.

    ForgeRock provides an identity platform to helps global brands, enterprises and government entities build secure, customer-facing relationships across any app, device or thing, user can use online identities to grow revenue, extend reach and launch new business models, and the company.

    With IdentityNow, the modern SaaS identity governance solution, you can control security, compliance, and growth. Empower your employees while securing ALL of your digital identities as they access ALL applications and ALL data across your hybrid IT environment.

    Social-ID for CIAM, a solution to authenticate and to register customers at Website, Mobile apps and Wifi portals.

    High expectations to deliver at lightning speed is leading to applications being used outside the visibility of IT. Identity-as-a-service (IDaaS) can help you stay on top of cloud adoption and enable an experience your workforce will appreciate.

    The Drawbridge Identity Graph transforms customer data into a powerful competitive advantage. Advanced machine learning on 100 billion edges gives you the ability to perform advanced queries and construct identities with higher fidelity than ever. Our industry-leading technology sets our graph apart and empowers you to see people as people, not just a set of links. Unmatched scale and coverage: We offer the industry’s highest coverage of consumers and connected devices, extending across 80% of the world’s internet users. If your customers live on Earth, chances are we can help. Industry-leading precision: Drawbridge Identity Graph predicts matches with up to 97.3% precision, validated by Nielsen and others as the most precise technology-driven solution ever tested—and we do it at scale.

    FusionAuth provides enterprise-ready auth, registration, login, MFA, SSO, user management and more. 100% free for unlimited users. Built for developers, it installs in minutes for any size web or mobile application from start-up to unicorn to enterprise. FusionAuth provides secure, single-tenant, on-prem or private cloud identity with social login, custom emails with localization, customizable registration branding, group-based authentication and more. Deploys on macOS, Linux, Windows, and cloud servers as well as any dev box for local development. Docker and Kubernetes images also available.

    IBM Security Access Manager deploys a simplified access management solution for enterprises to defend from threat vulnerabilities.

    With Omada Customer Identity and Access Management (CIAM) you’re able to manage external identities with the same level of security and access governance as for your internal identities. With a web-based portal for self-registration you can encourage your customers and external partners to engage with your company while ensuring data privacy and security. Combining Omada identity and access management with CIAM ensures maximum return on investment as CIAM utilizes the powerful Omada Identity Suite with its components, advance business flows, and governance features.

    Superior scalability with innovative identity management that spans all things connected.

    Centrify is redefining the legacy approach to Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases. As traditional network perimeters dissolve, organizations must discard the old model of “trust but verify” which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Organizations may consider approaching Privileged Access Management by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions. Centrify’s industry-recognized solution redefines legacy Privileged Access Management and goes beyond simple password vaulting to converge the core tenets of Zero Trust Privilege. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse. Organizations turn to Centrify Zero Trust Privilege to … • Secure access • Stop breaches • Empower business operations • Increase business confidence • Secure the vote! Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by leading private equity investment firm Thoma Bravo.

    Cidaas uses local data hubs to ensure the highest security standards: primarily with secure interface authentication through OAuth2 protocol and OpenID Connect and, above all through, multi-factor authentication, the unambiguous verification of user identities and fraud detection based on BigData Technolgy.

    Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

    Evident is revolutionizing the way personal data is shared. Our simple, secure Identity Assurance Platform lets businesses of all sizes, industries, and geographies confidently know who they're dealing with without handling sensitive personal data. Our API enables enterprise customers to access and verify the data they need from individuals without incurring the risk of handling it, and gives individuals control over who sees their data and when. Evident is on a mission to bring confidence and peace of mind to every personal data interaction, making it possible to exchange personal data without unnecessary risk or friction.

    The IAM Cloud platform sits at the heart of an organisation's IT infrastructure. Once connected, it flows data between systems, and uses intelligent identity management to automate processes such as user creation and provisioning, security configuration and login control, and a range of advanced IT features like Single Sign On, password resets, MFA, and admin-to-user communications.

    IDMWorks is an expert-level Identity and access management consultancy.

    LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. Improve Customer Engagement with Seamless Registration and Authentication: Remove barriers to customer acquisition and conversion across all digital properties. Options include standard username and password, phone registration, and passwordless login. Secure Customer Identities and Build Trust: Create a verification process that provides an extra layer of security. Multi-factor authentication and risk-based authentication are quick and easy to set up. Meet all major regional regulations and policies with LoginRadius Cloud Storage, deployed over 29 data centers worldwide. Leverage Identity for Growth: A LoginRadius implementation can be up and running within a few weeks, giving an instant return on investment by saving months of time and significant resources. Cut engineering costs by up to 95% with a ready-to-deploy CIAM solution that addresses all customer identity needs in one platform. Get a Deep Understanding of Customers with Unified Profiles: Deploy a single customer identity to track and recognize customers at each touchpoint in their journey. Progressively gain a better understanding of how they interact with your brand so you can personalize the digital experience.

    OWAGuard is a exchange server authentication security solution designed to protect Outlook Web App users and businesses from a variety of logon and password attacks, and real-time reporting and alerts of suspicious OWA logon activity.

    ProdataKey is a cloud-based access control management system.

    Trusona developed the world's first and only insured digital identity authentication solution and are leading a movement where there are no passwords to be created, remembered, stolen, or compromised. Where people are who they say they are - every time.

    The Ubisecure Identity Platform solves today's identity management issues and is built to scale for future business requirements for digital transformation, omni-channel services, IoT, big data, and more. Our product centric approach is designed to dramatically reduce Identity & Access Management (IAM) deployment and operating costs, and maximise your upsell and cross-sell revenue, and incorporates both the on-premise Identity Server and the managed Identity Cloud service.

    UnboundID Platform is an identity and preference management platform that allows you to enable new customer-facing digital business initiatives by capturing customer preferences, experiences, and more.

    user authentication password protection membership management scripts

    Anomalix Identity as a Service is a cloud-based managed service that provides a cost effective alternative to in-house Identity and Access Management (IAM) operations and administration. Anomalix's IDaaS solution eliminates hardware, software and human capital costs from the security equation. The value proposition is a lower total cost of ownership, faster time to market and increased flexibility to focus on business initiatives instead of operational and administrative overhead.

    Identification and log-in solution for your platforms with electronic-IDs.

    Axiomatics Data Access Filter intercepts data retrieval requests to databases and changes them in real-time, based on user entitlements as defined by corporate policies.

    CloudAccess unifies the convenience and security of single sign on (access management) with the controls of identity management. It enables the secure delivery of essential information and applications to your employees, partners, suppliers, and customers via secure SSO.

    The CoreOne Suite combines three innovative solutions in one suite. Identity & Access Management (IAM), IT Operations Management and Single Sign-On (SSO).

    Credntia is an identity management system that consolidate all credentials in one place.

    Datacard Secura identity & credential management software revolutionizes the issuance and post-issuance management of highly secure passports, national IDs, PIV cards and other secure government credentials. It streamlines every step of the process, including enrollment, identity verification, application approval, document issuance and post issuance management.

    Entrust Datacard TruCredential software suite is a solution for creating, issuing and managing secure ID cards and credentials. The software allows organizations to meet a wide range of application requirements, from basic photo ID cards to high-assurance credentials.

    A real-time behavioral monitoring, analytics and adaptive access control platform that proactively secures online accounts, information, transactions, and interactions from log in to log out