Best Identity and Access Management (IAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity and access management (IAM) software helps companies protect their systems from unauthorized access or misuse by only allowing authenticated, authorized users (typically employees, based on job roles) to access specific, protected company systems and data. IT administrators leverage the software to quickly provision, deprovision, and change user identities and the corresponding user access rights at scale.

IAM software authenticates users, provides access to systems and data based on company policies, tracks user activity, and provides reporting tools to ensure employees are in compliance with company policies and regulations. Many IAM solutions include single sign-on (SSO) and password manager features. For employees, once users authenticate by signing into their accounts or using other multi-factor authentication methods, they are granted limited access to company systems allowed by their user type to complete their typical job functions.

Additionally, many IAM products are now being integrated with generative artificial intelligence (AI) features. These AI features allow IAM products to automate routine tasks that can be cumbersome for IT and InfoSec teams while predicting identity-related misconfigurations and recommending various access controls.

IAM software differs from privileged access management (PAM) software. IAM software is used to authorize, authenticate, and grant specific access to everyday users, such as company employees. However, PAM software is used to provide administrative or superusers with granular access to business-critical assets and privileged credentials. IAM software also differs from customer identity and access management (CIAM) software, which provides a company’s customers, as opposed to employees, with secured access to customer applications.

To qualify for inclusion in the Identity and Access Management (IAM) category, a product must:

Provision and deprovision user identities
Assign access based on individual role, group membership, and other factors
Enforce user access rights based on permissions
Verify user identity with authentication, which may include multi-factor authentication methods
Integrate with directories that house employee data
Show More
Show Less

Featured Identity and Access Management (IAM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
203 Listings in Identity and Access Management (IAM) Available
(1,167)4.5 out of 5
1st Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Okta
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and dev

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 39% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    207
    Security
    158
    Authentication Security
    153
    Single Sign-On
    143
    Easy Access
    140
    Cons
    Authentication Issues
    77
    Login Issues
    64
    Expensive
    46
    Complex Setup
    44
    Frequent Authentication
    39
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.1
    9.1
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,638 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and dev

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 39% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
207
Security
158
Authentication Security
153
Single Sign-On
143
Easy Access
140
Cons
Authentication Issues
77
Login Issues
64
Expensive
46
Complex Setup
44
Frequent Authentication
39
Okta features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
9.1
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.1
9.1
On-premises solution
Average: 8.3
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,638 Twitter followers
LinkedIn® Page
www.linkedin.com
7,230 employees on LinkedIn®
(3,941)4.5 out of 5
Optimized for quick response
3rd Easiest To Use in Identity and Access Management (IAM) software
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a tool that manages user access and authentication, unifying identity, access, and device management into a single, cloud-native platform.
    • Users frequently mention that JumpCloud simplifies IT operations by providing a single source of truth for users and devices, enabling strong security through SSO, MFA, and automated onboarding/offboarding.
    • Reviewers noted that the initial setup and policy configuration can be complex, especially for organizations migrating from traditional Active Directory or managing advanced security use cases.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    881
    Device Management
    664
    Security
    519
    Integrations
    482
    Features
    431
    Cons
    Missing Features
    382
    Improvement Needed
    301
    Limited Features
    235
    Limitations
    177
    Learning Curve
    156
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Tracking
    Average: 8.6
    9.0
    User provisioning
    Average: 9.1
    8.2
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    36,556 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    959 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a tool that manages user access and authentication, unifying identity, access, and device management into a single, cloud-native platform.
  • Users frequently mention that JumpCloud simplifies IT operations by providing a single source of truth for users and devices, enabling strong security through SSO, MFA, and automated onboarding/offboarding.
  • Reviewers noted that the initial setup and policy configuration can be complex, especially for organizations migrating from traditional Active Directory or managing advanced security use cases.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
881
Device Management
664
Security
519
Integrations
482
Features
431
Cons
Missing Features
382
Improvement Needed
301
Limited Features
235
Limitations
177
Learning Curve
156
JumpCloud features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.4
Tracking
Average: 8.6
9.0
User provisioning
Average: 9.1
8.2
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
36,556 Twitter followers
LinkedIn® Page
www.linkedin.com
959 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(893)4.5 out of 5
4th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Microsoft Entra ID
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 39% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    129
    Security
    122
    Single Sign-On
    90
    Identity Management
    89
    Integrations
    80
    Cons
    Complexity
    56
    Expensive
    53
    Complex Administration
    42
    Difficult Learning
    38
    Complex Setup
    37
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Tracking
    Average: 8.6
    9.0
    User provisioning
    Average: 9.1
    8.6
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,088,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226,132 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 39% Mid-Market
  • 36% Enterprise
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
129
Security
122
Single Sign-On
90
Identity Management
89
Integrations
80
Cons
Complexity
56
Expensive
53
Complex Administration
42
Difficult Learning
38
Complex Setup
37
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.8
Tracking
Average: 8.6
9.0
User provisioning
Average: 9.1
8.6
On-premises solution
Average: 8.3
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,088,873 Twitter followers
LinkedIn® Page
www.linkedin.com
226,132 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Identity and Access Management (IAM) is a web service that enables you to securely control access to AWS services and resources. It allows you to manage permissions, ensuring that only authenticat

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 33% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Identity and Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    31
    Ease of Use
    23
    Access Control
    22
    Intuitive
    21
    Easy Management
    20
    Cons
    Complexity
    22
    Difficult Learning
    21
    Learning Curve
    12
    Error Handling
    7
    Lack of Information
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Tracking
    Average: 8.6
    9.1
    User provisioning
    Average: 9.1
    8.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,220,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152,002 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Identity and Access Management (IAM) is a web service that enables you to securely control access to AWS services and resources. It allows you to manage permissions, ensuring that only authenticat

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 33% Mid-Market
  • 32% Enterprise
AWS Identity and Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
31
Ease of Use
23
Access Control
22
Intuitive
21
Easy Management
20
Cons
Complexity
22
Difficult Learning
21
Learning Curve
12
Error Handling
7
Lack of Information
6
AWS Identity and Access Management (IAM) features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Tracking
Average: 8.6
9.1
User provisioning
Average: 9.1
8.4
On-premises solution
Average: 8.3
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,220,069 Twitter followers
LinkedIn® Page
www.linkedin.com
152,002 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fine-grained access control and visibility for centrally managing cloud resources.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity & Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Security
    16
    Accessibility
    12
    Intuitive
    12
    Access Control
    11
    Cons
    Difficult Learning
    10
    Complexity
    9
    Complex Usage
    7
    Access Permissions
    6
    Access Control
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Tracking
    Average: 8.6
    9.1
    User provisioning
    Average: 9.1
    7.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,755,640 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,935 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Fine-grained access control and visibility for centrally managing cloud resources.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 25% Mid-Market
Google Cloud Identity & Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Security
16
Accessibility
12
Intuitive
12
Access Control
11
Cons
Difficult Learning
10
Complexity
9
Complex Usage
7
Access Permissions
6
Access Control
5
Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Tracking
Average: 8.6
9.1
User provisioning
Average: 9.1
7.7
On-premises solution
Average: 8.3
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,755,640 Twitter followers
LinkedIn® Page
www.linkedin.com
325,935 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Verified Access is a service that enables secure, VPN-less access to corporate applications and resources by implementing fine-grained access policies based on user identity and device security st

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 28% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Vertrified Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    14
    Reliability
    9
    Intuitive
    8
    Access Control
    7
    Integrations
    7
    Cons
    Difficult Learning
    10
    Complexity
    7
    Lack of Information
    6
    Learning Curve
    6
    Expensive
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Vertrified Access features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.1
    9.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,220,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152,002 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Verified Access is a service that enables secure, VPN-less access to corporate applications and resources by implementing fine-grained access policies based on user identity and device security st

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 28% Small-Business
AWS Vertrified Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
14
Reliability
9
Intuitive
8
Access Control
7
Integrations
7
Cons
Difficult Learning
10
Complexity
7
Lack of Information
6
Learning Curve
6
Expensive
5
AWS Vertrified Access features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.2
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.1
9.4
On-premises solution
Average: 8.3
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,220,069 Twitter followers
LinkedIn® Page
www.linkedin.com
152,002 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(495)4.5 out of 5
Optimized for quick response
14th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Cisco Duo
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 41% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Security
    67
    Authentication
    46
    Easy Access
    46
    Authentication Ease
    40
    Cons
    Authentication Issues
    24
    Login Issues
    16
    Complexity
    15
    Notification Issues
    15
    Delay Issues
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Tracking
    Average: 8.6
    9.6
    User provisioning
    Average: 9.1
    8.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,514 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 41% Enterprise
  • 37% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Security
67
Authentication
46
Easy Access
46
Authentication Ease
40
Cons
Authentication Issues
24
Login Issues
16
Complexity
15
Notification Issues
15
Delay Issues
14
Cisco Duo features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.1
Tracking
Average: 8.6
9.6
User provisioning
Average: 9.1
8.7
On-premises solution
Average: 8.3
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,514 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
(182)4.3 out of 5
Optimized for quick response
Entry Level Price:$1.71 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • IBM Verify CIAM is a customer identity and access management solution that manages customer accounts, handles identity verification, and ensures secure logins across various platforms.
    • Reviewers like the strong security features of IBM Verify CIAM, including single sign-on and multi-factor authentication, which reduce login problems and protect user data.
    • Users experienced complexity during the initial setup and configuration, and suggested improvements such as a more visual dashboard and step-by-step tutorial features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Verify CIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    48
    Authentication
    38
    Features
    29
    MFA Authentication
    29
    Cons
    Complex Setup
    38
    Complexity
    35
    Difficult Learning
    33
    Difficult Setup
    31
    Complex Administration
    30
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify CIAM features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Tracking
    Average: 8.6
    8.5
    User provisioning
    Average: 9.1
    8.4
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access,

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • IBM Verify CIAM is a customer identity and access management solution that manages customer accounts, handles identity verification, and ensures secure logins across various platforms.
  • Reviewers like the strong security features of IBM Verify CIAM, including single sign-on and multi-factor authentication, which reduce login problems and protect user data.
  • Users experienced complexity during the initial setup and configuration, and suggested improvements such as a more visual dashboard and step-by-step tutorial features.
IBM Verify CIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
48
Authentication
38
Features
29
MFA Authentication
29
Cons
Complex Setup
38
Complexity
35
Difficult Learning
33
Difficult Setup
31
Complex Administration
30
IBM Verify CIAM features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.6
Tracking
Average: 8.6
8.5
User provisioning
Average: 9.1
8.4
On-premises solution
Average: 8.3
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,798 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(1,034)4.7 out of 5
2nd Easiest To Use in Identity and Access Management (IAM) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 61% Mid-Market
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rippling IT Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    670
    Intuitive
    467
    Simple
    413
    Easy Access
    374
    User Interface
    361
    Cons
    Missing Features
    165
    Limited Features
    112
    Improvement Needed
    89
    Learning Curve
    75
    Poor Customer Support
    73
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rippling IT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Tracking
    Average: 8.6
    9.3
    User provisioning
    Average: 9.1
    9.0
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rippling
    Company Website
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @Rippling
    11,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,941 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 61% Mid-Market
  • 27% Small-Business
Rippling IT Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
670
Intuitive
467
Simple
413
Easy Access
374
User Interface
361
Cons
Missing Features
165
Limited Features
112
Improvement Needed
89
Learning Curve
75
Poor Customer Support
73
Rippling IT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
9.2
Tracking
Average: 8.6
9.3
User provisioning
Average: 9.1
9.0
On-premises solution
Average: 8.3
Seller Details
Seller
Rippling
Company Website
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@Rippling
11,873 Twitter followers
LinkedIn® Page
www.linkedin.com
6,941 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Identity Cloud Service (IDCS) is a comprehensive Identity-as-a-Service (IDaaS) platform that delivers core identity and access management capabilities through a multi-tenant cloud infrastructur

    Users
    No information available
    Industries
    • Automotive
    Market Segment
    • 47% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Oracle Identity Cloud Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Single Sign-On
    2
    SSO (Single Sign-On)
    2
    Access Control
    1
    Ease of Use
    1
    Cons
    Difficult Learning
    2
    Implementation Difficulty
    1
    Integration Issues
    1
    Lack of Expertise
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.2
    Tracking
    Average: 8.6
    8.9
    User provisioning
    Average: 9.1
    8.8
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    825,309 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    198,071 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Identity Cloud Service (IDCS) is a comprehensive Identity-as-a-Service (IDaaS) platform that delivers core identity and access management capabilities through a multi-tenant cloud infrastructur

Users
No information available
Industries
  • Automotive
Market Segment
  • 47% Mid-Market
  • 37% Enterprise
Oracle Identity Cloud Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Single Sign-On
2
SSO (Single Sign-On)
2
Access Control
1
Ease of Use
1
Cons
Difficult Learning
2
Implementation Difficulty
1
Integration Issues
1
Lack of Expertise
1
Learning Curve
1
Oracle Identity Cloud Service features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.2
Tracking
Average: 8.6
8.9
User provisioning
Average: 9.1
8.8
On-premises solution
Average: 8.3
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
825,309 Twitter followers
LinkedIn® Page
www.linkedin.com
198,071 employees on LinkedIn®
Ownership
NYSE:ORCL
(3,972)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for Salesforce Platform
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 34% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Salesforce is a cloud-based platform designed for managing customer data, automating workflows, and creating custom user interfaces.
    • Users frequently mention the platform's high level of customization, its ability to integrate with other tools, and its robust reporting and dashboard capabilities as key benefits.
    • Users reported issues with the platform's complexity, particularly for new users, its high cost, especially for smaller teams, and occasional performance issues.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1,639
    Features
    799
    Customization
    674
    Customizability
    670
    Customization Options
    630
    Cons
    Learning Curve
    574
    Complexity
    539
    Expensive
    485
    Difficult Learning
    413
    Missing Features
    412
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Tracking
    Average: 8.6
    8.7
    User provisioning
    Average: 9.1
    8.7
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    580,922 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86,064 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 34% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Salesforce is a cloud-based platform designed for managing customer data, automating workflows, and creating custom user interfaces.
  • Users frequently mention the platform's high level of customization, its ability to integrate with other tools, and its robust reporting and dashboard capabilities as key benefits.
  • Users reported issues with the platform's complexity, particularly for new users, its high cost, especially for smaller teams, and occasional performance issues.
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1,639
Features
799
Customization
674
Customizability
670
Customization Options
630
Cons
Learning Curve
574
Complexity
539
Expensive
485
Difficult Learning
413
Missing Features
412
Salesforce Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Tracking
Average: 8.6
8.7
User provisioning
Average: 9.1
8.7
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
580,922 Twitter followers
LinkedIn® Page
www.linkedin.com
86,064 employees on LinkedIn®
(1,717)4.6 out of 5
6th Easiest To Use in Identity and Access Management (IAM) software
View top Consulting Services for 1Password
100% Off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    333
    Security
    271
    Password Management
    182
    Intuitive
    144
    Easy Access
    134
    Cons
    Password Management
    95
    Expensive
    91
    Login Issues
    69
    Autofill Issues
    64
    Cost
    60
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Tracking
    Average: 8.6
    9.2
    User provisioning
    Average: 9.1
    9.1
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Company Website
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    139,467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,911 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 32% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
333
Security
271
Password Management
182
Intuitive
144
Easy Access
134
Cons
Password Management
95
Expensive
91
Login Issues
69
Autofill Issues
64
Cost
60
1Password features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
9.3
Tracking
Average: 8.6
9.2
User provisioning
Average: 9.1
9.1
On-premises solution
Average: 8.3
Seller Details
Seller
1Password
Company Website
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
139,467 Twitter followers
LinkedIn® Page
www.linkedin.com
2,911 employees on LinkedIn®
(639)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Identity and Access Management (IAM) software
20% Off: $2.87 user / month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

    Users
    • CEO
    • CTO
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 72% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NordPass Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    198
    Security
    158
    Password Management
    131
    Intuitive
    121
    Sharing Ease
    118
    Cons
    Password Management
    92
    Password Issues
    68
    Login Issues
    55
    Autofill Issues
    50
    Browser Extension Issues
    44
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NordPass Business features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Tracking
    Average: 8.6
    8.5
    User provisioning
    Average: 9.1
    7.8
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Global
    Twitter
    @NordPass
    9,517 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,883 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trusted by more than 9,000 businesses worldwide, NordPass is a password management tool that upholds the finest privacy and security standards for businesses. Unlock the ease of cybersecurity and b

Users
  • CEO
  • CTO
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 72% Small-Business
  • 25% Mid-Market
NordPass Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
198
Security
158
Password Management
131
Intuitive
121
Sharing Ease
118
Cons
Password Management
92
Password Issues
68
Login Issues
55
Autofill Issues
50
Browser Extension Issues
44
NordPass Business features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Tracking
Average: 8.6
8.5
User provisioning
Average: 9.1
7.8
On-premises solution
Average: 8.3
Seller Details
Company Website
Year Founded
2012
HQ Location
Global
Twitter
@NordPass
9,517 Twitter followers
LinkedIn® Page
www.linkedin.com
1,883 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    11
    Integrations
    10
    Ease of Use
    9
    Easy Management
    8
    SSO (Single Sign-On)
    8
    Cons
    Difficult Learning
    7
    Complexity
    4
    Learning Curve
    4
    Limited Features
    4
    Expensive
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Tracking
    Average: 8.6
    9.7
    User provisioning
    Average: 9.1
    10.0
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,755,640 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,935 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 27% Small-Business
Google Cloud Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
11
Integrations
10
Ease of Use
9
Easy Management
8
SSO (Single Sign-On)
8
Cons
Difficult Learning
7
Complexity
4
Learning Curve
4
Limited Features
4
Expensive
3
Google Cloud Identity features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.2
6.7
Tracking
Average: 8.6
9.7
User provisioning
Average: 9.1
10.0
On-premises solution
Average: 8.3
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,755,640 Twitter followers
LinkedIn® Page
www.linkedin.com
325,935 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

    Users
    • Software Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 76% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SailPoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    36
    Features
    30
    Security
    24
    Identity Management
    21
    Integrations
    21
    Cons
    Improvement Needed
    17
    Poor Customer Support
    16
    Missing Features
    14
    Expensive
    12
    Difficult Learning
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SailPoint features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.2
    Tracking
    Average: 8.6
    8.8
    User provisioning
    Average: 9.1
    8.6
    On-premises solution
    Average: 8.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SailPoint
    Company Website
    Year Founded
    2004
    HQ Location
    Austin, TX
    Twitter
    @SailPoint
    15,041 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,441 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

Users
  • Software Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 76% Enterprise
  • 18% Mid-Market
SailPoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
36
Features
30
Security
24
Identity Management
21
Integrations
21
Cons
Improvement Needed
17
Poor Customer Support
16
Missing Features
14
Expensive
12
Difficult Learning
11
SailPoint features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.2
Tracking
Average: 8.6
8.8
User provisioning
Average: 9.1
8.6
On-premises solution
Average: 8.3
Seller Details
Seller
SailPoint
Company Website
Year Founded
2004
HQ Location
Austin, TX
Twitter
@SailPoint
15,041 Twitter followers
LinkedIn® Page
www.linkedin.com
3,441 employees on LinkedIn®

Learn More About Identity and Access Management (IAM) Software

What is Identity and Access Management (IAM) Software?

Companies use identity and access management (IAM) software to both enforce their security controls regarding who has access to corporate assets and to promote worker productivity with ease of access to the tools they need to do their jobs. IAM software achieves this by allowing only authorized and authenticated users, such as employees, contractors, and devices, to access corporate resources at their appropriate permission level based on predetermined policy-based controls. 

Using IAM software, company administrators can quickly provision, deprovision, or change user identities and access rights to corporate assets at scale. Each user is granted the right level of access permissions based on their user or group membership type. This makes it easier for security teams to manage who has access to what accounts at scale, and for end users to quickly gain access to the tools they need to do their jobs instead of waiting for their individual accounts to be provisioned one by one. For example, a newly promoted departmental leader at a company may need permissions to fully access the proprietary data stored within an application. This can easily be granted to them due to their management group membership, while a junior-level employee would not need that kind of granular access, so they would only be permissioned to view non sensitive data stored within the application. IAM software also tracks user activity, enabling administrators to confirm that users are accessing corporate assets in compliance with company policies.

Using IAM software and utilizing policy-based controls to enforce least privilege strategies, companies can protect against unauthorized access from both external actors like hackers and non permissioned internal users (insider threats) who have insufficient access level permissions. IAM software is used as an important component of a company’s zero-trust, least-privilege security model, where all users’ identities are verified prior to granting access to corporate resources. This is different from prior security models that enforced perimeter security where once a user is inside the corporate network, they are granted free access and movement across the network, and not required to be authenticated again to use other applications.

What Does IAM Stand For?

IAM, sometimes also listed as IdAM, stands for identity and access management. IAM software is sometimes also referred to as workforce identity or employee identity management. Other acronyms related to IAM include CIAM for customer identity and access management (CIAM) software which is used for customer-related identity management. Similarly, for government-related identity products, the acronym ICAM stands for Identity, credential, and access management. Another acronym, IDaaS, stands for identity as a service.

What are the Common Features of Identity and Access Management (IAM) Software?

The following are some core features within IAM software:

Authentication: IAM providers offer multi-factor authentication (MFA) methods for users to prove their identity prior to being granted access to corporate resources. MFA requires more than a single authentication factor, such as only a username and password. Authentication factors can include one-time passcodes (OTPs), software tokens, mobile-push, hardware tokens, and more. More advanced authentication methods include biometric authentication and passwordless authentication. 

More recently, IAM providers are utilizing risk-based authentication (RBA) methods, also known as contextual authentication, intelligent MFA, or adaptive MFA, which analyzes real-time information about users, such as their IP addresses, devices, and behaviors to continually verify their identity. 

Identity lifecycle management or user provisioning and deprovisioning: IAM software providers offer administrators the ability to manage the lifecycle of an identity—from quickly provisioning to deprovisioning, along with user changes including attributes, roles, permissions, and other entitlements. Some IAM providers also offer a universal directory.

Directory: IAM providers will either integrate with existing directory providers or offer a universal directory service.

Single sign-on (SSO): IAM software provides SSO functionality to enable end users to access their business applications all in one place and requiring them to authenticate once.

User activity monitoring: IAM software enables administrators to track user activity, including anomalous activity. This kind of auditing is to ensure compliance with secure access control policies. IAM solutions often provide standard reports for this.

What are the Benefits of Identity and Access Management (IAM) Software?

Security: The main benefit of implementing identity and access manager software is for improved security. IAM software manages access governance, allowing only verified, authorized, and permissioned users to access company assets. This helps mitigate risks from external hackers or insider threats.

Productivity or enabling the workforce: In addition to improved security, companies that deploy IAM software to streamline the login experience, may lead to productivity gains with users. Having a simple to use security product with SSO requiring only one login and that also organizes the user’s corporate applications and accounts all in one place can save the user time and frustration. 

Regulatory compliance: Many global governmental or industry regulations require companies to have security controls to be in place. Identity management is a major component of a well-rounded information security program.

Who Uses Identity and Access Management (IAM) Software?

Information security (infosec) professionals: Infosec professionals use IAM software as a foundational component of their security program.

IT Administrators: IT admins may be responsible for managing IAM software, especially as it relates to provisioning and deprovisioning users.

End users and devices: End users such as employees or contractors use IAM software in their day-to-day work activities to access corporate assets needed to do their jobs. Devices such as internet of things (IoT) devices require the validity of their identity in order to access corporate resources, including other IoT devices.

What are the Alternatives to Identity and Access Management (IAM) Software?

Alternatives to IAM solutions can replace this type of software, either partially or completely include:

Single sign-on (SSO) software: SSO software, which is a component of a complete IAM software solution, is an authentication tool that allows users to sign into multiple applications or databases with a single set of credentials. SSO software will not have identity governance and user lifecycle management features that an IAM solution would provide.

Multi-factor authentication (MFA) software: MFA, which is a component of a complete IAM software solution, is used to have users prove their identity in two or more ways before granting them access privileges to corporate accounts. There are many types of authentication factors above the standard single factor of login credentials like usernames and passwords, including something the user has like a mobile device or security token, something the user is, such as a scan of their faceprint or fingerprint, or somewhere the user is, like their geographical location and IP address. Newer forms of MFA include risk-based authentication and passwordless authentication.

Password manager software: Password manager software, or password management software, stores a user's individual passwords through either an encrypted vault downloaded to a user’s computer or mobile device, or digitally through browser plugins or extensions. The passwords stored in this software are managed by the user, not by a corporate administrator.

Software Related to Identity and Access Management (IAM) Software

Related solutions that can be used together with IAM software include many types of identity management software:

Customer identity and access management (CIAM) software: CIAM software is similar to IAM software, but used for customer identities instead of workforce identities like employees, contractors, and corporate devices. 

Privileged access management (PAM) software: PAM software helps companies protect the most critical IT resources by ensuring the credentials of their privileged accounts, such as admin accounts are only accessed by those with proper permissions to do so. When users access these privileged accounts, they must check in and check out and are often monitored during the time they are using the privileged account. PAM solutions are used in conjunction with IAM software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. 

User provisioning and governance tools: User provisioning and governance tools enable companies to manage user account identities throughout their lifecycle, including provisioning and deprovisioning. These solutions are often deployed on-premises, but many tools are offering cloud-based solutions, as well. 

Cloud directory services software: Similar to user provisioning and governance tools, cloud directory services software enables companies to manage user identities throughout their lifecycle, including provisioning and deprovisioning, in a cloud-deployed manner. Companies use these tools as they transition away from traditional on premises or locally operating identity management software to cloud services and SaaS applications. 

Challenges with Identity and Access Management (IAM) Software

Identity management solutions and IAM systems can come with their own set of challenges. 

Policy and group management: Managing corporate access policies and group management is a company policy-related issue, not necessarily a technical one. It can get overwhelming for IAM administrators when companies have undefined or even conflicting policies as to which users have access to what resources. Administrators may be asked by leadership to provide users with much higher levels of access than their policy or group access control would normally allow, thus introducing risks into the environment.

Identity for cloud vs. on-premises applications: Depending on the company’s technology stack, businesses may have a mix of both on-premises and cloud-based applications and resources. Companies must ensure that their IAM solution has connectors to the types of systems they need support for, especially for hybrid IT environments.

Insufficient MFA methods: It is important that the MFA component of the identity program is strong to prevent unauthorized use which can lead to data breaches. Many IAM providers are moving away from less secure MFA methods, such as email one-time-passcodes to stronger authentication methods like risk-based authentication or contextual authentication.

How to Buy Identity and Access Management (IAM) Software

Requirements Gathering (RFI/RFP) for Identity and Access Management (IAM) Software

When gathering and prioritizing the company's requirements, it is important to consider the following factors.

Ease for end users: In order for IAM software to be effective, end users have to actually use it. The IAM solution must be easy to use by the end user and become part of their everyday routine. 

Authentication methods: Are there limitations on the types of authentication factors that the company’s employees, contractors, and devices can use? For example, employees may be able to use authentication methods such as hardware tokens and biometrics, while temporary contractors might rely on in-app mobile pushes or OTPs sent via email, SMS, or phone. Additionally, if employees in a manufacturing facility or healthcare unit cannot carry a mobile phone with them, authentication factors requiring a mobile device may not be suitable.

Regional considerations: Is the company global? Does the IAM solution need to support multiple languages, use cases, and adhere to local data protection regulations? Businesses must ensure the IAM provider can accommodate the company’s geographic and regional-based needs.

Integrations: Companies should determine which integrations are important to them. The most critical integration would likely be the user directory solution, such as an HR system, if a directory is not provided by or being used within the IAM solution.

Timeline: The company must decide how quickly they need to implement the solution.

Level of support: Buyers should know if they require high-quality support or if they prefer implementing the solution in house.

Compare Identity and Access Management (IAM) Software Products

Create a long list

There are many providers of IAM software. The best way to begin narrowing the search for products that would work well for the company would be to start by company segment size, such as small, medium, or enterprise-size businesses. By visiting the Identity and Access Management (IAM) software page on G2.com, buyers can filter solutions by market segment using the left-hand filter radio buttons.

Create a short list

After looking through IAM solutions for particular company size, buyers should ensure it meets the authentication and regional needs. If a specific language is a requirement, buyers can filter solutions by language by visiting the Identity and Access Management (IAM) software page on G2.com. For other requirements, such as how easy it is to use, the “Easiest to use” section of the Identity and Access Management (IAM) software page on G2 helps compare options. Users can further narrow the selection by reading user reviews, checking the product’s ranking on the G2 Grid® report for the Identity and Access Management (IAM) software category, and reading other related IAM-related resources.

Conduct demos

At each demo, buyers must be sure to ask the same questions and use case scenarios to best evaluate each product. Potential buyers can contact many vendors directly on g2.com to request demos by selecting the “Get a quote” button. 

Selection of Identity and Access Management (IAM) Software

Choose a selection team

The selection team should include the day-to-day administrator of this product, who is likely an information security or related cybersecurity professional or an IT administrator professional. Companies may also consider having someone from HR join the selection committee to provide context regarding new hire onboarding and employee offboarding, as it relates to the user provisioning or deprovisioning aspect of IAM software. And lastly, it is important to include a typical day-to-day end user to ensure that the end user experience is easy to use and can be widely adopted by the workforce.

Negotiation

When negotiating the contract, buyers must consider pricing, implementation, and support. Typically longer length contracts and larger license counts can improve price discounting. 

Final decision

The final decision maker should likely be the day-to-day administrator of the solution, likely an information security professional or an IT administrator professional, with input from other stakeholders on the selection team. Prior to purchasing an IAM solution, buyers should check if they can get a trial period to test with a small number of users before going all in on the product. If the tool is well received by end users and administrators, businesses can feel more confident in their purchase.

Which IAM platform is best for managing user roles?

When choosing an IAM platform that's best for managing user roles, I would consider some of these popular IAM platforms:

These platforms are known for their robust features and efficient management of user roles.

What is the best identity management tool with multi-factor authentication?

If you're seeking identity management tools with multi-factor authentication, here are some top options to consider:

  • Microsoft Entra ID: excels with its risk-based conditional access that can dynamically require different authentication factors based on login patterns, device health, and location signals.
  • JumpCloud: provides a cloud-based directory platform that manages user identities, devices, and access across various systems. It supports multiple operating systems and offers features like SSO, MFA, and device management, catering well to hybrid and remote work environments.
  • Okta: offers robust identity management features, including single sign-on (SSO) and multi-factor authentication (MFA). It’s highly scalable and integrates well with various applications