Home / Identity and Access Management (IAM)

Identity and Access Management (IAM)

Secure your digital world with robust Identity and Access Management solutions. Control who accesses what.

8MAN
Free

8MAN View 8MAN

8MAN is a robust Access Rights Management (ARM) solution designed for Microsoft and virtual server environments, safeguarding sensitive data from unauthorized access. Developed in Germany and acquired by SolarWinds in 2018, 8MAN offers comprehensive core functions including in-depth permission analysis, continuous security monitoring, automated documentation and reporting, and optimized role and process management, empowering organizations to strengthen their security posture.

Permission Analysis
Security Monitoring
Documentation & Reporting
Aceiss
Free

Aceiss View Aceiss

Aceiss delivers comprehensive access governance with unparalleled visibility into user activity across your entire technology stack. Gain critical insights to proactively identify anomalous behavior and toxic access combinations, strengthening your security posture.

Comprehensive User Access Visibility
Anomalous Behavior Detection
Toxic Combination Identification
Adaptive Shield
Free

Adaptive Shield View Adaptive Shield

Adaptive Shield delivers comprehensive control over your SaaS security posture, empowering organizations to proactively discover and remediate vulnerabilities across their entire SaaS ecosystem. By offering continuous security for global settings and user privileges, Adaptive Shield addresses the inherent complexities of managing disparate SaaS security models, ensuring consistent policy enforcement and reducing the risk of misconfigurations.

Proactive SaaS vulnerability detection and remediation
Continuous security monitoring for global settings
Automated user privilege management and auditing
ADGS
Free

ADGS View ADGS

ADGS is a deeptech innovator specializing in Agent-Based simulations, Cybersecurity, Biometrics, Social Dynamics, NLP, and AI. Our advanced technologies tackle significant societal challenges and are poised to revolutionize how we address critical global issues, disrupt industries, and create new market opportunities. Our cybersecurity solutions, like STROKK, offer unparalleled, transparent multi-factor authentication by analyzing unique typing biometrics, enhancing security exponentially without user friction.

Agent-Based Simulation for Emergent Behavior Analysis
Advanced Cybersecurity and Biometric Authentication
Social Dynamics and Natural Language Processing Solutions
AGAT Software
Free

AGAT Software View AGAT Software

AGAT Software delivers robust external access authentication and comprehensive data protection for enterprises. Leveraging a sophisticated reverse proxy, our solutions provide advanced multi-factor authentication, device access control, and proactive threat management. AGAT is trusted by leading government, financial, and global corporations to safeguard sensitive data and secure critical infrastructure against evolving external access risks.

Advanced Multi-Factor Authentication (MFA)
Device Access Control
Active Directory Password Protection
AUTOCRYPT
Free

AUTOCRYPT View AUTOCRYPT

AUTOCRYPT by MIRACL and Imperva, in partnership with XYPRO and Securezoo, delivers comprehensive identity and access management (IAM) solutions with a strong focus on data and application security. Leveraging MIRACL's passwordless, multi-factor authentication accessible across all devices and XYPRO's robust security expertise for HPE Non-Stop environments, AUTOCRYPT fortifies your digital assets against modern threats. This integrated approach ensures simplified yet powerful information security, ideal for small to mid-sized businesses and security professionals seeking advanced protection and compliance adherence.

Passwordless Multi-Factor Authentication (MFA)
Universal Device Compatibility (Mobiles, Desktops, Smart TVs)
HPE Non-Stop Security and Compliance Solutions
1Kosmos
Free

1Kosmos View 1Kosmos

1Kosmos delivers unparalleled digital identity and passwordless authentication for both workforces and customers. Leveraging cutting-edge biometrics and a private, permissioned blockchain, BlockID provides indisputable identity proofing, ensuring absolute certainty of user identities. This unique approach goes beyond traditional passwordless solutions by integrating decentralized identity management, fortified by advanced security protocols, to safeguard digital assets and streamline access.

Indisputable Digital Identity Proofing
Advanced Biometric Authentication
Passwordless Authentication
2Keys
Free

2Keys View 2Keys

2Keys, now part of Interac, is a premier provider of comprehensive digital identity and cybersecurity platforms, delivered through expert managed and professional services in Canada. We specialize in designing, deploying, and operating robust solutions that prioritize confidentiality, availability, integrity, and privacy. Our deep expertise in identity and access management, coupled with leading-edge cybersecurity, empowers businesses to securely enhance and protect their digital value.

Managed Digital Identity Platforms
Professional Cybersecurity Services
Platform Design and Deployment
AET Europe
Free

AET Europe View AET Europe

AET Europe is a premier provider of advanced technological solutions focused on robust user identification and authentication. Specializing in the software development for secure element deployment and management, including smart cards, tokens, and digital certificates, AET enables secure access for critical sectors such as Government, Healthcare, Finance, and Enterprises. Their innovative digital ID technology empowers governments to offer citizens secure, 24/7 access to eGovernment services and facilitates the deployment of employee and citizen eIDs for mobile devices, all while adhering to stringent security policies.

Secure element management (smart cards, tokens)
Digital certificate solutions
Government and public sector identity solutions
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement