Software Alternatives & Reviews

20 Identity Management Solutions You Should Know

SailPoint Oracle Identity Manager Okta OneLogin Microsoft Azure Active Directory CloudIdentify AWS Identity and Access Management EmpowerID Rippling Lastpass
  1. IdentityNow identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis.
    Wherever sensitive data lies, SailPoint’s identity governance platform keeps tabs on who could access it, who actually accesses it and what they do with it. The latest version of the platform also helps IT allocate permissions, with machine learning algorithms that learn how organizations work and recommend title-appropriate privileges for new users. While the suggestions aren’t perfect, they’re always improving thanks to what SailPoint’s Mike Kiser calls a “virtuous loop” between human and machine intelligence. Essentially, the algorithms handle easy decisions, which frees up humans to focus on harder decisions, which then inform and improve the SailPoint algorithms.

    #Identity And Access Management #Identity Provider #SSO

  2. Oracle Identity Management enables oganizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources.
    Part of Oracle’s middleware family, Oracle Identity Management offers an array of scalable tools for crafting user directories, personalizing user access and more. Together, these tools can manage the entire lifecycle of a login credential, from when it’s created and granted permissions to when it’s retired. Oracle offers cutting-edge user authentication, too, that’s based on passwords as well as typical digital behavior — how the user moves their mouse, say, or how quickly they type — which offers an added layer of protection against hackers and bots.

    #Identity And Access Management #Identity Provider #HR

  3. 3
    Enterprise-grade identity management for all your apps, users & devices
    Okta offers two identity management systems: Workforce Identity (for employees) and Customer Identity. The two obviously have different features, but both offer Okta’s easy-to-implement adaptive multi-factor authentication (MFA) — essential in a threatscape where stolen credentials account for more than 80 percent of data breaches. The adaptive MFA basically assesses the risk-level of each login attempt, and requires more authentication for riskier situations — a user checking in from, say, a new device or a new country. Depending on context, logging in could be as simple as entering a password, or it could require a combination of password, a security question and a fingerprint.

    #Identity And Access Management #Identity Provider #SSO 6 social mentions

  4. On-demand SSO, directory integration, user provisioning and more
    As the name suggests, OneLogin lets users log into a multitude of popular apps — including the Google Suite, Workday and Mailchimp — with a single set of credentials. This doesn’t create the same vulnerabilities as manually reusing a single password, though. That’s thanks to OneLogin’s high-tech security features. Vigilance AI, for instance, employs behavioral analytics and other variables to scout for risky logins and the Shield browser extension screens every website users visit to flag phishing attempts.

    #Identity And Access Management #Identity Provider #SSO 1 social mentions

  5. Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 …
    With a single sign on, Microsoft Azure’s Active Directory allows users to access more than 2,800 SaaS apps, from Salesforce to Canvas — provided they’re cleared to access them, of course. Azure AD also lets IT personnel customize access to sensitive materials and outline conditional access protocols. (For example: “This user should have access to this app only while connected to this network after providing two-factor authentication.”) Built for flexibility, the platform accommodates users including employees, partners and customers, accessing Cloud or on-premise servers.

    #Identity And Access Management #Identity Provider #SSO 15 social mentions

  6. Protect company data, maximize IT efficiency, and transition to a digital workspace with a unified identity, access, app, and device management platform.
    Google’s Cloud Identity streamlines both the end-user experience and identity governance duties. It lets users access a universe of more than 5,000 apps with a single sign-on; meanwhile, IT leadership can manage their organization’s authorized users, apps and devices in a single interface. Google secures this convenient design with constantly updated threat intelligence and Beyondcorp, a zero-trust security solution that mandates encryption and multi-factor authentication. According to Google, Cloud Identity lets employees work remotely on any device from anywhere in the world, all without posing an unmanageable security risk.

    #Identity And Access Management #Identity Provider #SSO 7 social mentions

  7. AWS Identity and Access Management enables you to securely control access to AWS services and resources for your users.

    #Identity And Access Management #Identity Provider #SSO 52 social mentions

  8. EmpowerID is an all-in-one Identity Management and Cloud Security suite.
    EmpowerID is all about giving users choices. Like many identity and access management solutions, it allows users to access all their apps via a single sign-on. It adds an extra layer of customizability, though: users can choose which of their existing credentials becomes their universal login. A user could, for instance, “empower” their Microsoft, Facebook, or Google logins to be universal logins. IT managers, too, enjoy a kind of universal login on the platform: They can customize user privileges across multiple sites from a single dashboard.

    #Identity And Access Management #Multi-factor Authentication #Identity Provider

  9. One directory for employee information across IT, HR, legal, finance and facilities.
    Rippling fuses HR & IT into a single, scalable digital system. That might sound like a random combination at first, but it’s a major timesaver. Hiring a new employee, for instance, involves innumerable small-but-important HR and IT tasks. The hire must be added to the company directory and payroll. They need a computer and login credentials, as well as appropriate privileges for various apps. Rippling’s streamlining automation ensures that HR and IT always work in lockstep so an employee’s IT privileges grow with each promotion and expire on their last day.

    #HR #HR Tools #Employee Management

  10. LastPass is an online password manager and form filler that makes web browsing easier and more secure.
    Pricing:
    LastPass may be best known for its free, encrypted password manager, but the company also makes a paid identity management solution that’s used by more than 60,000 businesses. The comprehensive Enterprise version blends LastPass’s signature hard-to-hack passwords — encrypted at the device level, rather than the centralized Cloud level — with a bevy of other features, including a single sign-on for more than 1,200 apps, safe password-sharing between employees and detailed security reports for IT.

    #Password Management #Password Managers #Security & Privacy 22 social mentions

  11. Duo Security provides cloud-based two-factor authentication. Duo’s technology can be deployed to protect users, data, and applications from breaches, credential theft, and account takeover.
    Used by WhatsApp and Etsy, Duo Security was designed with modern companies in mind. That means it prioritizes speed. The DuoMobile app, for instance, simplifies multi-factor authentication. Users can merely tap on a push notification instead of typing in an SMS code to complete their login. Duo also allows for a modern, mobile-friendly work culture by letting organizations run security assessments on devices they don’t manage, including employee smartphones.

    #Identity And Access Management #Two Factor Authentication #Identity Provider 31 social mentions

  12. Online password manager for teams
    Pricing:

    #Password Managers #Team Productivity #Security

  13. Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats

    #Password Managers #Password Management #Security & Privacy

  14. Ping Identity provides cloud-based, single sign-on and identity management solutions with their SAML SSO.
    Ping Identity offers all the hallmarks of an identity management system, including single sign-on access to countless apps, multi-factor authentication and customizable permissions. But its most noteworthy offering might be intelligent API security. APIs, or application programming interfaces, play a central role in the integrations and plug-ins we all take for granted; they let developers build tools like, say, Google Maps into non-Google apps. However, APIs also create security risks. Ping Identity offers a solution: machine-learning algorithms that monitor API traffic closely, pinpointing security issues like token thefts and bot attacks.

    #Identity And Access Management #Identity Provider #SSO

  15. Our Enterprise Mobility Management (EMM) solutions help gain control of mobile access security, minimize threats, manage devices & more. Start a FREE Trial!
    Centrify’s constellation of zero-trust products minimize security threats in myriad ways. Adaptive multi-factor authentication is just the beginning. Centrify products also ensure that not even administrators get automatic access to sensitive data. Instead, after requesting the data, all users must explain why they need it and for how long. They’re then connected to it through Cloud-based jump boxes, which help protects digital infrastructure from malware. Throughout the process, Centrify keeps granular activity logs for security audits and incident forensics.

    #Web Security #Cyber Security #Identity And Access Management

  16. Unified Active Directory, Exchange, and Office 365 management and reporting solution.
    Pricing:
    • Freemium
    • Free Trial
    • $595.0 / Annually (1 Domain + 2 Help Desk Technicians)

    #Monitoring Tools #Log Management #Password Management

  17. AuthAnvil software is an integrated identity and access management tool designed to help IT managers service their networks, infrastructure network, and ensure that devices are safe and secure at all times. Read more about AuthAnvil.
    Designed for management service providers, or MSPs, AuthAnvil gives its clients security infrastructure they can pass on to their clients. It’s security-as-service, rooted in the Azure Cloud, that offers single sign-on access to multiple apps. It’s backed by two-factor authentication that forestalls phishing attempts, which means that even a stolen password is insufficient for an unauthorized login. AuthAnvil also lets administrators implement organization-wide password policies through a password manager.

    #Web Security #Cyber Security #Identity And Access Management

  18. Dashlane is a secure way to bypass tedious logins, forms, and purchases online. Save all of your information and save time in your online transactions.
    Dashlane’s identity management tool for businesses is so comprehensive, users don’t even need to log out when they go home for the day. Instead, employees can divide their accounts into separate “Smart Spaces” for their personal and work passwords. That means Dashlane protects its users wherever they go online, autofilling relevant passwords as needed. It even scans the dark web, alerting users to any leaked passwords or personal information.

    #Password Management #Password Managers #Security & Privacy 7 social mentions

  19. NOTE: hidglobal.com DigitalPersona has been discontinued.
    HID DigitalPersona software offers a new way to provide authentication services. Learn more about its unmatched array of multi-factor authentication factors that balance security with ease of use.
    DigitalPersona software, one of HID’s many identity management offerings, takes multi-factor authentication to new heights. The basic premise remains the same: The more independent types of authentication required to log into a system, the more robust its security. However, DigitalPersona offers an unusual array of authentication types. Users can proffer passwords and answer security questions to log into Cloud, mobile and on-premise environments — but they can also use Touch ID, facial recognition, Apple Watches or bluetooth devices.

    #Identity And Access Management #Security & Privacy #Identity Provider

  20. We are One Identity: Identity Governance, Access Management, and Privileged Management Solutions for the Real World. Trusted by Leading Brands.

    #Identity And Access Management #Security & Privacy #Identity Provider

Discuss: 20 Identity Management Solutions You Should Know

Log in or Post with