Best Identity and Access Management (IAM) Software in New Zealand - Page 6

Find and compare the best Identity and Access Management (IAM) software in New Zealand in 2025

Use the comparison tool below to compare the top Identity and Access Management (IAM) software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    CoffeeBean Identity and Access Management Reviews
    CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management.
  • 2
    cidaas Reviews

    cidaas

    WidasConcepts

    cidaas presents an ideal solution for efficient and secure identity management, allowing the creation of a single identity for each user across various channels seamlessly. Utilizing the OAuth2.0 and OpenID Connect standards, cidaas ensures robust API security, while its integrated Bot Net Detection and Fraud Detection features provide a safeguarded experience throughout all business interactions. This modern approach to Identity and Access Management is characterized by a comprehensive suite of features that facilitate rapid integration and implementation for diverse use cases and systems. We manage the complexities so you can concentrate on your core business operations without the burden of maintenance or operational concerns. The prevalence of numerous passwords and PINs creates unnecessary challenges for users, acting as a significant barrier to accessing digital platforms. By adopting passwordless authentication, you can enhance the security of your digital applications while delivering an exceptional customer experience—because the login process is the first encounter your users have with your service. Ultimately, embracing this innovative identity management solution transforms user interactions and simplifies access in an increasingly digital world.
  • 3
    RAC/M Identity Reviews
    RAC/M Identity™ serves as a straightforward and efficient Identity Governance and Administration (IGA) solution, allowing organizations of any size to comprehend and oversee the intricate connections between users and their access to both physical and digital resources, whether they are hosted on-site or in the cloud. This solution is fundamental for establishing a robust Identity and Access Management (IAM) program capable of overcoming significant obstacles, including resource limitations, budget constraints, tight deadlines, and a multifaceted technological and business environment. Additionally, RAC/M Identity™ tackles one of the most significant hurdles that IAM initiatives face: securing ongoing executive backing. It automatically computes a comprehensive health score that indicates the maturity and efficiency of essential IAM processes, which enables executives to evaluate both the advancements achieved and the challenges that lie ahead during the implementation journey. By consistently detecting and addressing potential risks, such as orphaned or unauthorized accounts, and enforcing Segregation of Duties (SoD) policies, it effectively minimizes risk and ensures that unnecessary access is promptly revoked. Consequently, organizations can foster a more secure and compliant environment, ultimately bolstering their overall security posture.
  • 4
    AppIdentity Reviews
    The Identity and Access Management feature of the AppDirect Cloud Management Suite grants you significant administrative authority over cloud usage within your organization, all while ensuring that your team experiences the utmost in security and convenience in their cloud interactions. Our suite includes an extensive array of powerful tools such as single sign-on, multi-factor authentication, directory integration, comprehensive user management, and access to thousands of pre-integrated applications, all designed to enhance both productivity and security within your organization. With the AppDirect Cloud Management Suite, your users will fully harness the advantages of cloud services. This solution removes the hassle of managing passwords by providing secure single sign-on capabilities for applications through widely accepted standards like SAML 1.1/2.0, OpenID, OpenID Connect, OAuth 2.0, and WS-Federation. By logging in just once via AppDirect, users can seamlessly access all their web applications directly from their personalized MyApps page, making their workflow more efficient and streamlined. This innovative approach not only simplifies user access but also significantly boosts overall satisfaction with cloud services.
  • 5
    Simeio Reviews
    Simeio offers the best Identity and Access Management (IAM), which engages securely with anyone, anywhere and anytime with an unmatched "service first" philosophy. We can help you protect your customers, partners, and employees identities. Our job is to make access easy, reliable, and secure, wherever you are, in all areas of banking, hospitality and healthcare, as well as government and universities. We can also protect your brand reputation by protecting identities. To create a platform of exceptional reliability and security, we partner with, leverage, and interoperate solutions from the industry's most trusted businesses. Yes, our work is complex and specialized. You can let us handle all the complexity. We simplify the way your company manages identity.
  • 6
    HORACIUS IAM Reviews
    The efficiency of business operations is closely tied to how access rights to systems are managed, making the selection of a robust Identity Access Management (IAM) platform a critical strategic choice that can mitigate costs and risks while enhancing overall productivity within the organization. It begs the question: how can you guarantee that every user in your company possesses only the necessary levels of access, applications, data, and transaction capabilities? Moreover, the IAM platform's ability to seamlessly integrate with key Human Resources systems allows for the synchronization of vital information and the execution of crucial tasks essential for business continuity. This comprehensive management of user access history begins from the moment an employee joins the organization, extending all the way to the point when access rights are revoked upon their departure. Ultimately, investing in an effective IAM solution not only safeguards sensitive information but also streamlines operational workflows, fostering a secure and efficient working environment.
  • 7
    Ilantus Compact Identity Reviews
    For the first time, there exists a fully integrated IAM solution that is thorough, extensive, and accessible even to those without an IT background. This offering encompasses both Access Management and Identity Governance and Administration. A distinctive online digital guidance system is available to facilitate the implementation process step-by-step, allowing users to proceed at their own speed. In contrast to other providers, Ilantus additionally supplies tailored implementation support at no additional cost. The solution features seamless single sign-on (SSO) capabilities, ensuring that no application is overlooked, including both on-premises and thick-client applications. Whether your needs encompass web apps, federated or non-federated systems, thick-client setups, legacy applications, or custom solutions, all will be integrated into your SSO environment. Furthermore, mobile applications and IoT devices are included, ensuring comprehensive coverage. If you have a proprietary application, our interactive digital help guide will assist in the process, making integration straightforward. Additionally, should you require further help, Ilantus provides a dedicated helpline that operates 24/7 from Monday to Friday, ready to assist with any integration tasks you may have. This commitment to support ensures that users can confidently navigate their IAM journey without feeling overwhelmed.
  • 8
    Fischer Identity Reviews

    Fischer Identity

    Fischer International Identity

    Fischer enables organizations to establish a robust, predictable, and secure Global Identity® Architecture. At this moment, ensuring the security of an Identity Program is the top priority. Fischer Identity offers both hardware and software solutions along with Global Identity® Services aimed at safeguarding and managing IT resources effectively. Utilize our plug-and-play automation to facilitate reliable and secure provisioning, granting your identities the necessary access from day one while also allowing for on-demand deprovisioning of access. By automating processes the Fischer way, you can reduce dependency on professional services. Our governance framework equips you with the necessary oversight to maintain compliance across your organization. You will always have visibility into who has access to which resources, how they acquired that access, and the steps for remediation when issues arise. With Fischer Identity lifecycle management, you can accelerate your digital transformation and ensure that your identity management processes are both efficient and secure. The future of identity management is here, paving the way for organizations to thrive in a digital landscape.
  • 9
    ForgeRock Reviews
    The only AI-driven platform that combines all aspects of identity, governance and access management to dramatically improve and scale, it is the only one in the industry. Digital access is essential for our personal, professional, and educational lives. It is essential to accelerate digital transformation, provide superior experiences, and ensure the highest level of security in order to meet customer demand and keep up with our competitors. ForgeRock helps people connect to the world safely and easily by helping organizations improve and scale their identity, governance and access management. ForgeRock is the only AI-driven platform that offers a full suite of AI-driven solutions. It is designed for all types of identities (consumers and workers, as well as things). ForgeRock's simple-to-use, comprehensive solutions will help you increase revenue, manage risk, increase workforce productivity, and lower costs.
  • 10
    Assently CoreID Reviews
    Facilitate identity verification using various Nordic electronic IDs, including Swedish BankID, Norwegian BankID, Danish NemID, or the Finnish Trust Network. CoreID seamlessly integrates into your systems across multiple platforms, allowing you to eliminate time spent on infrastructure, maintenance, and upgrades. Enhance your online security measures while providing contemporary authentication solutions for your clients through the use of electronic IDs. Customers can easily authenticate themselves using Swedish BankID, Norwegian BankID, Danish NemID, or Finnish Trust Network, regardless of the device they are using. Assently adheres to GDPR regulations and holds ISO 27001 certification, which is the recognized international benchmark for information security. With Assently's advanced identification solution, CoreID, you can efficiently verify your customers' identities via electronic IDs. CoreID is also designed to be easily tailored and set up according to your specific requirements, allowing you to select which countries' electronic IDs to activate. You can implement Assently CoreID across any device, whether it's a mobile phone, tablet, or desktop, ensuring a versatile user experience on your website. This flexible solution empowers businesses to meet their identity verification needs while maintaining high security standards.
  • 11
    One Identity Reviews
    Eliminate the uncertainties associated with enterprise identity and access management by effectively reducing risks, safeguarding data, ensuring uptime, and fulfilling compliance requirements through tailored access for your users. Now, your approach to identity and access management (IAM) can align with business objectives rather than being limited by IT constraints. With Identity Manager, you can integrate security policies and meet governance demands for both the present and the future. At last, there's identity management software focused on the needs of the business rather than solely on IT capabilities. Identity Manager not only secures and governs your organization’s data and user access, but it also guarantees uptime, mitigates risks, and ensures compliance by providing users with precisely the access they require to data and applications, regardless of whether they are on-premises, hybrid, or cloud-based. Additionally, it helps you meet compliance and audit standards effectively. This comprehensive solution empowers organizations to maintain control over their identity management processes while adapting to evolving business requirements.
  • 12
    Entrust Identity as a Service Reviews
    Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats.
  • 13
    Keycloak Reviews
    Keycloak serves as a robust open-source solution for managing identity and access. It simplifies the process of adding authentication to applications and securing services, eliminating the hassle of user management and authentication, which are readily provided out of the box. Users can take advantage of sophisticated features like User Federation, Identity Brokering, and Social Login. To explore further, be sure to check the official documentation and consider giving Keycloak a try; its user-friendly design makes implementation straightforward. With its extensive capabilities, Keycloak stands out as an excellent choice for developers seeking efficient identity management.
  • 14
    Jellyfish Reviews
    Jellyfish has been designed as a versatile modular solution. We have made substantial advancements in managing identity, credentials, access, and various security products through the development of a collection of connectors known as Cognectors. These innovative connectors facilitate the establishment of automated workflows, transfer data across different systems, and allow triggers from one platform (such as PACS) to impact another (like LACS). The Cognectors channel information from diverse systems into the Service Bus, resulting in numerous advantages, including improved monitoring and activity reporting. As personnel join, shift roles, or exit an organization, access to systems and physical locations can be effortlessly modified through existing HR processes. Jellyfish employs contemporary authentication protocols and offers adaptive support to ensure compatibility with both logical and physical access control systems. By prioritizing future-proof security measures, Jellyfish adopts emerging standards and multi-factor authentication to enhance overall safety. This commitment not only streamlines access management but also positions organizations to adapt to evolving security challenges effectively.
  • 15
    Core Security Access Assurance Suite Reviews
    The Access Assurance Suite, part of the Core Security Identity Governance and Administration solutions formerly recognized as Courion, is a sophisticated identity and access management (IAM) software system that empowers organizations to facilitate informed provisioning, ensure continuous regulatory compliance, and utilize actionable analytics for enhanced identity governance. This suite consists of four leading-edge modules, providing an intelligent and efficient strategy for reducing identity-related risks while offering a comprehensive solution for optimizing the provisioning workflow, assessing access requests, managing compliance, and enforcing stringent password policies. Additionally, it features a user-friendly web portal where end users can easily request access, and managers have the ability to review and either approve or deny those requests. Adopting a shopping cart model, Core Access enhances the overall experience by streamlining processes and eliminating the need for cumbersome paper forms, emails, and tickets traditionally used for access management. This modern approach not only improves efficiency but also fosters better communication between users and administrators.
  • 16
    Airlock Reviews
    Airlock's Secure Access Hub safeguards applications, APIs, and data against identity theft and prevalent threats targeting web applications. Combining security with user-friendliness, Airlock facilitates a seamless customer journey through features like single sign-on, social registration, extensive user self-services, and effective consent management. In a fast-paced market, the ability to respond swiftly is essential, which is why the Airlock Secure Access Hub incorporates vital security features such as registration, authentication, and self-service options. This allows organizations to allocate their IT resources more effectively towards enhancing business operations. Furthermore, the Airlock Secure Access Hub is designed to ensure compliance with various international standards, including GDPR, PSD2, PCI-DSS, OWASP, and MAS. By serving as a centralized enforcement point for access policies, it simplifies adherence to regulations without requiring separate modifications for each application. Additionally, this comprehensive solution not only bolsters security but also enhances user satisfaction by streamlining access across platforms.
  • 17
    Anomalix Reviews
    From the very first day, it's crucial to involve employees and eliminate obstacles that hinder collaboration. Utilizing both real-time and historical data for access management can lead to lower compliance expenses while empowering the workforce. Implementing a passwordless enterprise identity and access management system offers a robust solution for managing employee lifecycle events—such as joining, moving, or leaving—ensuring the protection of sensitive information while granting the minimum access necessary for effective job performance. It's essential to recognize unusual and questionable behavior from users and entities, which can help in maintaining security. Developing precise and efficient job roles can ensure that individuals receive the appropriate level of access and information they need. Additionally, an identity management system tailored for non-employee individuals and corporate assets should be established to promote seamless cross-organizational collaboration, ultimately enhancing data quality and minimizing issues. Establishing a trusted source for all non-employee identities is vital, as is conducting the necessary due diligence concerning identity management. It is also important to oversee all identity lifecycle events related to individuals and assets, including engagement, changes, disengagement, and re-engagement, to foster a secure and efficient work environment. By doing so, organizations can better align their access strategies with their operational goals.
  • 18
    EyrID Reviews
    EyrID serves as an evaluation instrument that aids organizations in identifying and addressing problems and deficiencies within their Identity and Access Management (IAM) initiatives. It is essential for businesses to trust that their Identity Program will enhance both employee satisfaction and customer engagement. By utilizing EyrID, organizations can alleviate the workload on their identity management teams, allowing them to focus on critical transformations that enhance the overall efficiency of their identity programs. Our platform equips you with the necessary tools to develop securely, efficiently, and rapidly, while also facilitating the discovery, anonymization, and enrichment of data attributes, ultimately leading to more robust identity management practices. With EyrID, organizations can achieve a streamlined approach to IAM that fosters growth and adaptability in a rapidly changing environment.
  • 19
    iGRIFFIN Reviews
    iGRIFFIN serves as a comprehensive solution for managing accounts and privileges, commonly referred to as 'Identity and Access Management'. It facilitates unified account oversight, command regulation, access supervision, and user event auditing, employing multi-factor authentication methods to verify the identity of actual users. Additionally, it strengthens internal controls over organizational systems by utilizing automated processes for user access applications and approvals. This system ensures that control over potentially exploitable commands is rigorously maintained, allowing only those users who have completed the necessary application and approval steps to utilize such commands. Furthermore, the enforcement of these controls is designed to guarantee that only authorized personnel can gain access to sensitive data, thereby enhancing overall security and accountability within the organization. As a result, iGRIFFIN not only protects crucial information but also streamlines access management processes.
  • 20
    Xage Reviews

    Xage

    Xage Security

    Xage Security specializes in cybersecurity, focusing on zero trust asset protection specifically designed for critical infrastructure, industrial IoT, and operational technology (OT) settings. At the heart of its offerings is the Xage Fabric Platform, which supports various products and use cases, providing robust defense against cyber threats across OT, IIoT, IT, and cloud environments. Adopting a zero trust security model, Xage operates on the guideline of "never trust, always verify," ensuring that every user and device undergoes authentication before being granted access to any asset. Additionally, Xage implements detailed access policies that take into account user identity, situational context, and the risk associated with each asset. The portfolio of Xage includes solutions like Zero Trust Remote Access, Identity-Based Access Management, and Zero Trust Data Exchange, which cater to diverse operational needs. Various organizations, spanning government entities, utility services, and industrial manufacturers, utilize Xage’s products, relying on the company to safeguard their vital infrastructure, OT resources, and industrial data from potential cyber threats. This commitment to security empowers organizations to operate with greater confidence in an increasingly complex digital landscape.
  • 21
    Aembit Reviews
    Replace the traditional, insecure methods of managing non-human identities with our automated and transparent Workload IAM solution. Oversee workload-to-workload access just as you would for users, utilizing automated, policy-driven, and identity-centric controls that allow for the proactive mitigation of risks associated with non-human entities. Aembit enhances security by cryptographically validating workload identities in real-time, making certain that only authorized workloads can access your sensitive information. By injecting short-lived credentials into requests as needed, Aembit eliminates the necessity of storing or safeguarding secrets. Furthermore, it dynamically enforces access permissions based on real-time assessments of workload security posture, geographical location, and other critical behavioral factors. Aembit effectively secures access across cloud environments, on-premises infrastructure, and Software as a Service (SaaS) platforms, providing a comprehensive solution for identity management. This innovative approach not only simplifies security but also reinforces trust in your digital ecosystem.
  • 22
    Twine Reviews
    Twine creates AI digital cybersecurity employees that execute tasks from A-Z to help close the talent shortage in cyber teams. Alex, our first digital employee, is a self-taught, knowledgeable, and capable individual who can take on the Identity and Access Management (IAM), thereby achieving your organization's cybersecurity objectives.
  • 23
    bi-Cube Identity Access Management Reviews
    In the diverse IT landscape of modern organizations, managing employee data, accounts, and access permissions is a critical challenge. This raises the important question of who is authorized to perform specific actions, at what times, and within which environments. Every individual, whether an internal team member or an external consultant, must possess tailored access rights that align with their job responsibilities or roles. These permissions should ideally be granted upon hiring and automatically revoked when an employee departs from the organization. A robust Identity Access Management (IAM) system effectively manages these permissions through meticulous role-based access control, integrates seamlessly with existing infrastructures, ensures compliance and security through traceability, and can lead to significant reductions in IT costs, particularly by automating processes within systems like Active Directory. Furthermore, an efficient IAM system not only streamlines access management but also enhances overall organizational security by minimizing the risk of unauthorized access.
  • 24
    Symantec IGA Reviews
    As user experience and immediate access to data and services have become standard expectations, the IT infrastructure that underpins these advancements has expanded significantly in both size and complexity. Furthermore, IT departments are continually challenged to lower operational costs while ensuring adherence to an increasing array of industry and governmental regulations. Consequently, IT organizations find themselves needing to grant numerous individuals access to various applications more quickly, all while remaining accountable to a multitude of governing bodies overseeing this access. To address these demands, modern identity governance and administration solutions must offer extensive provisioning capabilities for both on-premises and cloud applications, in addition to entitlements certification that verifies the appropriateness of user privileges, all while being capable of managing millions of user identities efficiently. This evolution in technology underscores the critical need for robust solutions that can adapt to the dynamic landscape of user access and compliance requirements.
  • 25
    CzechIDM Reviews
    The IT department frequently faces an overwhelming number of routine tasks related to account management, such as creating accounts manually, resetting passwords, auditing activities, and managing accounts that have been inactive for extended periods. Often, there is a lack of clarity regarding who has access to what resources and where that information resides. Our goal is to assist clients in automating these repetitive tasks, consolidating their information systems, empowering business owners to manage accounts, and maintaining clear records of permissions that have been granted. Identity Management (IdM) focuses on streamlining identity and access management within IT infrastructures. It ensures that the appropriate individuals can access the correct data sources at the right time and for the right reasons, all while keeping accurate documentation readily available. By enhancing Identity and Access Management, we strive to make organizations more secure and efficient, ultimately simplifying user management across various systems within the company. Additionally, our services are designed to adapt to the evolving needs of organizations, ensuring they remain compliant and responsive to changes in access requirements.