Identity Management Software
Every time someone new joins your organization or switches roles, you're managing a cascade of access requests: which systems do they need, who approves it, when does it expire? Identity management software puts who gets access to what under one roof, so you're not chasing approvals across email threads or discovering months later that an ex-employee still has credentials. The real payoff shows up in your day-to-day: provisioning happens in minutes instead of weeks, you can audit who touched what and when, and compliance checkpoints run on their own. You're trading manual account creation and revocation for automated lifecycle management that scales as your company grows. It's the backbone that lets your team move faster without security becoming someone's part-time job. If you are after something more specific, have a look at our Access Management Software or Authentication Software categories.
Traditional IAM systems have been the backbone of digital identity and access management for years, but they are facing significant challenges and inadequacies in today’s evolving cybersecurity landscape. By embracing the Zero Trust philosophy, Infisign ensures a holistic… Learn more about Infisign.
Developed with due diligence requirements in mind, Integrity Advocate is employed by institutions & organizations who understand the importance of identity verification & participation monitoring in online testing and training. Ensuring that students, employees and contractors… Learn more about Integrity Advocate.
INI develops innovative interactive voice response, computer telephony integration, and self-service applications for high volume contact centers. Interactive Northwest, Inc. (INI) develops innovative interactive voice response (IVR), computer telephony integration (CTI), and… Learn more about Interactive Northwest.
Intercede® is a cybersecurity company specialising in identity, credential management and secure mobility to enable digital trust. It provides software and services that help organisations ensure the safety and security of their people, facilities, networks and information in… Learn more about Intercede.
At KYC Hub we strive to make knowing your customer and complying with anti-money laundering directives an easy process. Our suite of tools enables clients to perform KYC, AML and enhance due diligence on over 5 billion individuals and millions of corporate entities in over… Learn more about KYC Hub.
Our privilege management products help our customers secure access to their most critical IT assets and meet regulatory compliance requirements. Lieberman Software Corporation is the only company who proactively stops cyber attacks that bypass conventional enterprise defenses… Learn more about Lieberman Software.
Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider. Cyphercor's flagship product, LoginTC, is a mobile app that can contain multiple tokens to securely access LoginTC-enabled websites. Cyphercor provides LoginTC capabilities for free… Learn more about LoginTC.
LogonBox Limited is an innovative software vendor specializing in Identity Management and Remote Access solutions. With a focus on simplifying self-service password resets and enhancing identity security, LogonBox is dedicated to making identity management accessible and… Learn more about LogonBox.
Technology gives us superpowers. We believe in equipping everyone with superpowers quickly and securely. That’s why we are building Lumos, the first AppStore for companies. Employees can go to their Company AppStore and receive the right access to the right apps and permissions… Learn more about Lumos.
MetaMap is a customer identity platform that helps merchants unlock new opportunities by offering customizable solutions to their data and workflow needs. It provides user-friendly decision-making tools for different users, from developers to large enterprises, for providing… Learn more about MetaMap.









