G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.
Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p
The problem of Attack Path Management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify impact, and eliminate identity-based Attack
VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the s
Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi
Identity is the new perimeter and securing identities, establishing privileged access policies, and implementing zero trust programs are critical to protect organizations from threat actors. The rise
Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous
🛡️ Mirket ITDR – Identity-Centric Threat Detection for the Modern Enterprise Mirket ITDR, the threat detection module of our unified Mentis Platform, empowers organizations to detect identity-based at
Netwrix PingCastle helps organizations uncover and remediate weaknesses in their Active Directory and Entra ID environments before attackers can exploit them. It scans for misconfigurations, hidden vu
Obsidian Security is the first truly comprehensive threat and posture management solution built for SaaS. Our platform consolidates data across core applications to help your team optimize configurati
Permiso detects and protects against human and non-human identity threats across cloud and on-premise environments to provide modern threat detection for your modern attack surface. Permiso assesses e
Astrix Security's NHI Posture Management solution is designed to enhance organizational security by providing comprehensive visibility and control over non-human identities (NHIs) such as service acco
Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa
SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your A
Active Directory is a primary source for Authentication and Authorization for users and business applications. Microsoft doesn't provide out of the box tools that can be used to perform health & r
SPHERE is the leader in Identity Hygiene. We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon