Home / Identity and Access Management (IAM) / Access Rights Management

Access Rights Management

Securely control who accesses what with robust Access Rights Management solutions.

Try these 94 AI Access Rights Management Tools

Core Security
Free

Core Security View Core Security

Core Security, now part of Fortra, delivers comprehensive threat-aware identity and access management (IAM) solutions. By integrating actionable intelligence from identity analytics with prioritized vulnerability data, organizations gain deep insights into their security posture. This enables proactive identification, validation, and remediation of access risks and security threats, empowering teams to make faster, more informed security decisions and improve overall enterprise defense.

Threat-aware Identity and Access Management
Integrated Vulnerability Management
Real-time Identity Analytics
CyberArk Software
Free

CyberArk Software View CyberArk Software

CyberArk is a preeminent provider of Identity Security solutions, specializing in robust Privileged Access Management (PAM). The platform secures all identities, human and machine, across diverse environments including cloud, on-premises, and DevOps workflows. Leading global enterprises rely on CyberArk to safeguard their most sensitive assets, making it an indispensable partner for comprehensive cyber resilience.

Privileged Access Management (PAM)
Identity Security Automation
Secrets Management
CyberFOX
Free

CyberFOX View CyberFOX

CyberFOX delivers comprehensive Identity and Access Management (IAM) solutions specifically designed for Managed Service Providers (MSPs) and IT professionals navigating today's complex cybersecurity landscape. Our flagship products, Password Boss for robust password management and AutoElevate for secure privilege access management, provide the essential components for a complete IAM security strategy. By enabling precise monitoring, management, and mitigation of access risks, CyberFOX empowers IT teams to significantly enhance security postures for both their own operations and their clients' critical data, offering practical, cost-effective, and user-friendly security that simplifies end-user experiences.

Comprehensive Identity and Access Management (IAM)
Password management with Password Boss
Privilege Access Management (PAM) with AutoElevate
CyberQP
Free

CyberQP View CyberQP

CyberQP offers comprehensive Privileged Access Management (PAM) solutions specifically engineered for Managed Service Providers (MSPs) and IT departments. Seamlessly integrating with Active Directory, Azure AD, and IT Glue, CyberQP enhances security posture by mitigating ransomware and social engineering risks. Its advanced features, including automated password management and robust identity verification, empower helpdesks to reduce ticket volume, resolve issues faster, and secure sensitive accounts against both internal and external threats.

Privileged Access Management (PAM) for MSPs
Seamless Active Directory & Azure AD integration
Password security and identity verification
Delinea
Free

Delinea View Delinea

Delinea provides cloud-ready Privileged Access Management (PAM) solutions designed to secure modern hybrid enterprises. Leveraging the combined expertise of Thycotic and Centrify, Delinea places privileged access at the core of your cybersecurity strategy, aiming for seamless protection rather than overwhelming complexity.

Cloud-Ready PAM Solutions
Hybrid Enterprise Security
Privileged Access Orchestration
Edvance
Free

Edvance View Edvance

Edvance International Holdings Limited is a diversified cybersecurity group with a strategic focus on value-added distribution, innovative security technology development, and comprehensive Security-as-a-Service offerings. With a proven track record of consistent growth across Hong Kong, Macau, Mainland China, and Singapore, Edvance delivers robust cybersecurity solutions tailored to complex, evolving threats. Our expertise spans privileged access management and advanced threat defense, ensuring enterprise-grade security for businesses in dynamic markets.

Value-added cybersecurity solutions distribution
Security technology innovation and development
Comprehensive "Security-as-a-Service" offerings
Efecte
Free

Efecte View Efecte

Efecte is a leading Nordic SaaS provider delivering robust Identity and Access Management (IAM) and IT Service Management (ITSM) solutions. Our user-friendly platform empowers mid-sized enterprises, large corporations, and public sector organizations to streamline service delivery and enhance security through comprehensive identity and access governance. With Efecte, you gain a unified, intuitive approach to managing user identities and access rights, ensuring compliance and operational efficiency.

Identity and Access Management (IAM)
IT Service Management (ITSM)
Self-Service Portals
Entitle
Free

Entitle View Entitle

Entitle is a security-first, just-in-time (JIT) access management platform designed to alleviate the burden of risk management from IT and DevOps teams and centralize it within the Security domain. By automating permission management, Entitle eliminates the inherent conflict between productivity and security, enabling organizations to achieve robust cloud least privilege programs without compromising operational efficiency. Our SaaS solution tackles the challenges of manual permission handling, thereby removing productivity bottlenecks and fostering smoother collaboration across the enterprise.

Just-In-Time (JIT) Access Control
Automated Permission Management
Least Privilege Enforcement
Entro Security
Free

Entro Security View Entro Security

Entro Security provides a revolutionary, holistic cyber security platform designed for end-to-end protection of secrets and programmatic access across cloud environments. Addressing the critical threat of secret-based attacks, one of the top three attack vectors, Entro empowers CISOs and security teams with comprehensive oversight and uncompromised protection. Our platform offers in-depth visibility into all secrets, detailing ownership, enablement status, permissions, correlated services, and associated risk levels, enabling proactive security posture management.

End-to-end secrets protection
Programmatic cloud access security
Comprehensive secrets visibility
Ermetic
Free

Ermetic View Ermetic

Ermetic, now part of Tenable, offers an identity-first cloud security platform designed for comprehensive, multi-cloud protection. This SaaS solution uniquely prioritizes identity to provide deep visibility and context, automating risk detection and remediation. It simplifies the governance of cloud infrastructure and resource access, enabling organizations to effectively manage their security posture and mitigate complex access risks.

Identity-first cloud security posture management
Automated risk detection and remediation
Multi-cloud visibility and protection
Foxpass
Free

Foxpass View Foxpass

Foxpass provides robust cloud-hosted LDAP and RADIUS services to elevate your organization's server and network security. By seamlessly integrating with your existing Google Apps, Foxpass enforces granular access control, ensuring employees only have access to the resources they require, thereby bolstering your DevSecOps posture.

Cloud-hosted LDAP and RADIUS
Google Workspace integration
Granular access control policies
Fudo Security
Free

Fudo Security View Fudo Security

Fudo Security is a specialized provider of Privileged Access Management (PAM) and Privileged Session Monitoring (PSM) solutions. Our core mission is to deliver exceptionally user-friendly yet highly robust security tools that empower organizations to effectively control and monitor privileged access to critical assets, thereby preventing abuse and mitigating insider threats. With deep expertise, a proven track record, and a dedicated global network, Fudo Security ensures comprehensive protection and seamless compliance for your most sensitive infrastructure.

Privileged Session Recording and Monitoring
Automated Password Management and Rotation
Least Privilege Enforcement
Gathid
Free

Gathid View Gathid

Gathid is an advanced, SaaS-based identity governance platform engineered to simplify and secure complex access control scenarios. Built on decades of expertise in physical and digital access management, Gathid offers a lightweight yet powerful solution for modeling, auditing, and tracking user access with unparalleled flexibility and scalability. Empower your organization to proactively manage identity risks and ensure compliance across all company sizes, moving beyond the limitations of traditional IAM solutions.

Comprehensive identity governance and administration (IGA)
Real-time access modeling and exploration
In-depth identity audit and tracking capabilities
Gurucul
Free

Gurucul View Gurucul

Gurucul delivers advanced user behavior analytics and identity access intelligence to proactively defend against insider threats, account compromises, and data exfiltration across hybrid environments. Leveraging machine learning and predictive anomaly detection, Gurucul's Hybrid Behavior Analytics (HBA) architecture significantly reduces attack surfaces by identifying excessive privileges and preventing breaches before they occur. Protect your critical assets, sensitive data, and brand reputation with Gurucul's comprehensive security intelligence.

Hybrid Behavior Analytics (HBA)
User Behavior Analytics (UBA)
Identity Access Intelligence (IAI)
Hitachi ID Systems
Free

Hitachi ID Systems View Hitachi ID Systems

Hitachi ID Systems provides a robust suite of identity and access management solutions designed to enhance IT security, streamline compliance, and reduce operational costs. Their integrated platform offers comprehensive capabilities in identity governance, privileged access management, and password management, effectively managing user access across both on-premises and cloud environments. By automating access provisioning and deprovisioning and enabling proactive risk reduction, Hitachi ID empowers organizations to achieve improved security posture and demonstrable ROI.

Comprehensive Identity Governance and Administration
Privileged Access Management (PAM)
Password Management Solutions
Hydden
Free

Hydden View Hydden

Hydden simplifies identity security by providing a unified data layer across your entire identity technology stack. It tackles identity blindspots and cyber exposure caused by the proliferation of human and non-human accounts by bridging silos, accelerating IAM implementations, and delivering total visibility. Hydden empowers security teams to build a robust, next-generation identity security posture through continuous analysis and automated remediation of access rights and identity hygiene.

Unified Identity Data Layer
Automated Human & Non-Human Account Mapping
Continuous Access Rights Analysis
Ilex International
Free

Ilex International View Ilex International

Ilex International, now part of Inetum, is a leading European provider of specialized Identity and Access Management (IAM) solutions. Trusted by numerous blue-chip organizations, Ilex International is a recognized leader in IT security, with deep expertise in identity and rights management, granular access control, and robust authentication management. The acquisition by Inetum further solidifies its commitment to delivering comprehensive and innovative IAM strategies to global enterprises.

Comprehensive Identity and Rights Management
Advanced Access Control Solutions
Robust Authentication Management
IS Decisions
Free

IS Decisions View IS Decisions

IS Decisions provides a comprehensive suite of affordable, non-disruptive, and user-friendly Access Management solutions designed to empower IT teams. Our products, including UserLock and FileAudit, deliver robust security for your Active Directory infrastructures, SaaS applications, and sensitive data, whether on-premise or in the cloud. DigitalStakeout further enhances your cybersecurity posture by enabling proactive risk reduction and providing immediate, measurable improvements in security and ROI.

Comprehensive Access Management for AD and Cloud
On-premise and Cloud Identity Security
Proactive File and Folder Access Auditing
KeyData Cyber
Free

KeyData Cyber View KeyData Cyber

KeyData Cyber is a premier cybersecurity firm expert in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM), and Privileged Access Management (PAM). Leveraging a proprietary risk-based framework and deep industry expertise, KeyData Cyber empowers organizations to achieve business transformation through advanced consulting and system integration. Our specialized services ensure secure, compliant, and efficient access control, safeguarding critical assets against evolving cyber threats.

Expert Identity and Access Management (IAM) solutions
Comprehensive Customer Identity & Access Management (CIAM) services
Specialized Privileged Access Management (PAM) for enhanced security
Leostream
Free

Leostream View Leostream

Leostream's Remote Desktop Access Platform empowers IT professionals to deliver seamless, secure, and efficient work-from-anywhere experiences. Gain unified control over user access, security, cost, and provisioning through a single, intuitive interface, ensuring your workforce remains productive and protected regardless of location or device.

Single-pane-of-glass management
Secure remote access for any device, anywhere
Highly-granular access controls
LogMeIn
Free

LogMeIn View LogMeIn

LogMeIn empowers the modern workforce by enabling secure, seamless access to essential resources from any device, anywhere, anytime. As a pioneer in remote access and a leader in SaaS, LogMeIn's solutions are trusted by millions globally to facilitate productivity and collaboration, ensuring businesses can achieve their best work in today's evolving work environment. Its technology is integral for companies seeking robust and flexible access control solutions.

Secure Remote Access
Cross-Platform Compatibility
User and Device Management
Lumos
Free

Lumos View Lumos

Lumos is the enterprise-grade Unified Access Platform designed to provide comprehensive visibility and control over all application and data access. Leveraging its proprietary Unified Access Graph, Lumos empowers IT and Security teams to manage identities at scale, automate access workflows, and significantly reduce security risks and operational costs. Experience a truly self-driving approach to access management that enhances productivity and strengthens your overall security posture.

Unified Identity and Access Management
Automated Access Workflows
Comprehensive Visibility with Unified Access Graph
MajorKey Technologies
Free

MajorKey Technologies View MajorKey Technologies

MajorKey Technologies delivers a modern, agile governance model to enhance security performance by streamlining user access and mitigating business risk. We empower your workforce with the speed and agility needed for secure digital transformation, protecting intellectual property and ensuring compliance without sacrificing productivity. Our solutions enable you to design and implement comprehensive security programs across your entire IT ecosystem, effectively managing identity, risk, cost, and business continuity.

Reduced user friction for enhanced productivity
Mitigated business risk through robust security controls
Accelerated secure digital transformation initiatives
Munily
Free

Munily View Munily

Munily is a cutting-edge access control solution designed to streamline community entry processes. By replacing unreliable intercoms with an intuitive mobile and tablet application, Munily seamlessly connects security guards, residents, and administrators. This enhances security, reduces delays, and provides a modern, efficient visitor management system.

Digital ID verification for visitors
Real-time resident approval/denial notifications
QR code visitor entry via WhatsApp