Reduce your software costs by 18% overnight
Identity Governance and Access Control

Identity Governance and Access Control Alternatives & Competitors

Top Alternatives to Identity Governance and Access Control

  • Okta
  • JumpCloud
  • OneLogin
  • Auth0
  • CyberArk Idaptive

Top 20 Alternatives & Competitors to Identity Governance and Access Control

    #1
    #1
  1. Okta

    (391)4.4 out of 5

    Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall

    Categories in common with Identity Governance and Access Control:
  2. Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall

    Categories in common with Identity Governance and Access Control:

    UA
    So convenient to use to access all websites in one place.
    #2
    #2
  3. JumpCloud

    (302)4.6 out of 5
    Optimized for quick response

    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects users to their systems, applications, files, and networks.

    Categories in common with Identity Governance and Access Control:
  4. JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects users to their systems, applications, files, and networks.

    Categories in common with Identity Governance and Access Control:

    Mayank K.
    MK
    It was very easy to setup and we were up and running in very quick time. We could configure org wide policies for password management or end user configurations on laptops to implement Logon...Read more
    18%   of software applications aren't well liked by teams using them.
    Find out how your team feels about your stack with G2 Pulse Surveys.
    Learn More
    #3
    #3
  5. OneLogin

    (184)4.3 out of 5
    Optimized for quick response

    Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.

    Categories in common with Identity Governance and Access Control:
  6. Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.

    Categories in common with Identity Governance and Access Control:

    AG
    Service appears to be very fast and responsive.
    #4
    #4
  7. Auth0

    (136)4.5 out of 5
    Optimized for quick response

    Auth0 is a cloud service that provides a set of unified APIs and tools that enables single sign-on and user management for any application, API or IoT device, it allows connections to any identity provider from social to enterprise to custom username/password databases.

    Categories in common with Identity Governance and Access Control:
  8. Auth0 is a cloud service that provides a set of unified APIs and tools that enables single sign-on and user management for any application, API or IoT device, it allows connections to any identity provider from social to enterprise to custom username/password databases.

    Categories in common with Identity Governance and Access Control:

    UA
    I liked the ease of use of the platform and the framework.
    #5
    #5
  9. CyberArk Idaptive

    (94)4.4 out of 5

    Today’s new reality requires a new kind of access platform. Built on Zero Trust, Idaptive is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.

    Categories in common with Identity Governance and Access Control:
  10. Today’s new reality requires a new kind of access platform. Built on Zero Trust, Idaptive is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.

    Categories in common with Identity Governance and Access Control:

    David M.
    DM
    All three of their products that we use from idaptive work great, we've been using their SSO / MFA for about 3 years now and really like the features.
    #6
    #6
  11. Ping Identity

    (91)4.4 out of 5

    Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'

    Categories in common with Identity Governance and Access Control:
  12. Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'

    Categories in common with Identity Governance and Access Control:

    KV
    It's pretty easy to use once you understand how it works. I've never experienced down time while trying to access Ping Identity.
    #7
    #7
  13. Microsoft Azure Active Directory

    (86)4.3 out of 5

    Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.

    Categories in common with Identity Governance and Access Control:
  14. Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.

    Categories in common with Identity Governance and Access Control:

    AW
    I love that fact and gives me peace of mind providing data security, high availability, and most of all its cost-effective.
    #8
    #8
  15. AWS Identity and Access Management (IAM)

    (66)4.4 out of 5

    AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

    Categories in common with Identity Governance and Access Control:
  16. AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

    Categories in common with Identity Governance and Access Control:

    BG
    An easy tool to securely manage identities, resources, and permissions at scale.
    #9
    #9
  17. Oracle Identity Management

    (60)3.7 out of 5

    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.

    Categories in common with Identity Governance and Access Control:
  18. Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.

    Categories in common with Identity Governance and Access Control:

    AG
    Many references in Oracle support forum, Customizable
    #10
    #10
  19. RingCaptcha

    (43)4.6 out of 5

    RingCaptcha is a simple, secure and reliable phone verification platform based on 2FA OTP through SMS, voice, missed call technology. RingCaptcha is resilient against attacks and operates reliably in all corners of the world, for people from all walks of life. The universally accessibility of the phone identity makes it mandatory for businesses that are powered by masses, such as, sharing economy, marketplace, cryptocurrency, etc.

    Categories in common with Identity Governance and Access Control:
  20. RingCaptcha is a simple, secure and reliable phone verification platform based on 2FA OTP through SMS, voice, missed call technology. RingCaptcha is resilient against attacks and operates reliably in all corners of the world, for people from all walks of life. The universally accessibility of the phone identity makes it mandatory for businesses that are powered by masses, such as, sharing economy, marketplace, cryptocurrency, etc.

    Categories in common with Identity Governance and Access Control:

    Alphones H.
    AH
    This software is easy to use with simple dashboard, and most of all the integration process is very smooth and support services are really awesome. Whenever we sent support requirements, you...Read more
    #11
    #11
  21. Salesforce Identity

    (41)4.3 out of 5

    Salesforce Platform provides an out-of-the-box identity solution using open standards, including SAML, OpenID Connect, OAuth, and SCIM. Now IT can manage apps, users, and data sharing with simplicity and transparency.

    Categories in common with Identity Governance and Access Control:
  22. Salesforce Platform provides an out-of-the-box identity solution using open standards, including SAML, OpenID Connect, OAuth, and SCIM. Now IT can manage apps, users, and data sharing with simplicity and transparency.

    Categories in common with Identity Governance and Access Control:

    AM
    Ease of access and customization as an admin
    #12
    #12
  23. SecureAuth Identity Platform

    (30)4.4 out of 5

    SecureAuth is an identity security company that enables the most secure and flexible authentication experience for employees, partners and customers. Delivered as a service and deployed across cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world. The company provides the tools to build identity security into new and existing applications and workflows without impacting user experience or engagement, resulting in increased productivity and reduced risk.

    Categories in common with Identity Governance and Access Control:
  24. SecureAuth is an identity security company that enables the most secure and flexible authentication experience for employees, partners and customers. Delivered as a service and deployed across cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world. The company provides the tools to build identity security into new and existing applications and workflows without impacting user experience or engagement, resulting in increased productivity and reduced risk.

    Categories in common with Identity Governance and Access Control:

    Laura C.
    LC
    I like it because it offers a great user experience with its good interface very comfortable and flexible, in addition to being excellent to reinforce safety at work, and best of all, it is very...Read more
    #13
    #13
  25. ForgeRock

    (29)4.4 out of 5

    ForgeRock provides an identity platform to helps global brands, enterprises and government entities build secure, customer-facing relationships across any app, device or thing, user can use online identities to grow revenue, extend reach and launch new business models, and the company.

    Categories in common with Identity Governance and Access Control:
  26. ForgeRock provides an identity platform to helps global brands, enterprises and government entities build secure, customer-facing relationships across any app, device or thing, user can use online identities to grow revenue, extend reach and launch new business models, and the company.

    Categories in common with Identity Governance and Access Control:

    UB
    Easy to implement Authentication and Authorization using OpenAM. Troubleshoot the issues is also easy.
    #14
    #14
  27. Avatier Identity Anywhere

    (26)4.6 out of 5
    Optimized for quick response

    The World's First Identity-as-a-Container (IDaaC) Platform. Docker Container Cloud-Independent Identity Management for Everyone.

    Categories in common with Identity Governance and Access Control:
  28. The World's First Identity-as-a-Container (IDaaC) Platform. Docker Container Cloud-Independent Identity Management for Everyone.

    Categories in common with Identity Governance and Access Control:

    CT
    Pretty much everything you need OOTB; Very easy to install and get going; Can be mostly run by staff without in depth technical skills;
    #15
    #15
  29. Amazon Cognito

    (26)3.9 out of 5

    Amazon Cognito lets you add user sign-up and sign-in and access control to your web and mobile apps quickly and easily. It scales to millions of users, and supports sign-in with social identity providers such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0.

    Categories in common with Identity Governance and Access Control:
  30. Amazon Cognito lets you add user sign-up and sign-in and access control to your web and mobile apps quickly and easily. It scales to millions of users, and supports sign-in with social identity providers such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0.

    Categories in common with Identity Governance and Access Control:

    UI
    I like the fact that is easy to use and learn, in 10 minutes i built a working user database.
    #16
    #16
  31. SailPoint

    (24)4.3 out of 5

    With IdentityNow, SailPoint delivers integrated IAM services from the cloud that automate compliance, provisioning, password management, and access management.

    Categories in common with Identity Governance and Access Control:
  32. With IdentityNow, SailPoint delivers integrated IAM services from the cloud that automate compliance, provisioning, password management, and access management.

    Categories in common with Identity Governance and Access Control:

    UF
    Before SailPoint was introduced to my company, there was a lot of manual work that one had to be done for one person on my team. However, with this product, it has made our employees self...Read more
    #17
    #17
  33. IBM Security Verify Access

    (18)4.0 out of 5

    Provides access management and multi-factor authentication (MFA) to help organizations maintain security as they adopt new technologies.

    Categories in common with Identity Governance and Access Control:
  34. Provides access management and multi-factor authentication (MFA) to help organizations maintain security as they adopt new technologies.

    Categories in common with Identity Governance and Access Control:

    Eduardo L.
    EL
    Swift and easy integration for a fully functional access management solution both internally and externally.
    #18
    #18
  35. Azure Active Directory B2C

    (13)3.9 out of 5

    Azure Active Directory B2C offers consumer identity and access management in the cloud, improves consumer connections, protects their identities, and more.

    Categories in common with Identity Governance and Access Control:
  36. Azure Active Directory B2C offers consumer identity and access management in the cloud, improves consumer connections, protects their identities, and more.

    Categories in common with Identity Governance and Access Control:

    CP
    It has been very easy to work with. It is very reliable. I am very happy. We were able to set-up Global signatures and use this product in the cloud with ease. I would recommend using this as your...Read more
    #19
    #19
  37. Symantec IGA

    (13)3.3 out of 5

    The Layer7 Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement

    Categories in common with Identity Governance and Access Control:
  38. The Layer7 Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement

    Categories in common with Identity Governance and Access Control:

    UA
    CA Identity Manager delivers a unified solution for user provisioning and user management that manages users’ identities throughout their entire life cycle, providing them with timely, appropriate...Read more
    #20
    #20
  39. IBM Security Verify

    (12)3.8 out of 5

    Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics

    Categories in common with Identity Governance and Access Control:
  40. Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics

    Categories in common with Identity Governance and Access Control:

    UU
    Secure file and folders storage in cloud service