Best Identity Governance and Administration (IGA) Software for Enterprise - Page 2

Find and compare the best Identity Governance and Administration (IGA) software for Enterprise in 2025

Use the comparison tool below to compare the top Identity Governance and Administration (IGA) software for Enterprise on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    RapidIdentity Reviews

    RapidIdentity

    Identity Automation

    Identity Automation offers a comprehensive solution for identity, access, governance, and administration that is highly scalable throughout its entire lifecycle. Their leading product, RapidIdentity, empowers organizations to boost their business agility while prioritizing security and improving user experience. If your organization aims to enhance security measures, mitigate risks associated with data and network breaches, and lower IT expenditures, adopting RapidIdentity is the ideal choice. By implementing this solution, businesses can also optimize their operational efficiency and achieve a more seamless integration of security protocols.
  • 2
    Bravura Identity Reviews
    Bravura Identity offers a comprehensive solution for overseeing identities, groups, and security entitlements across various systems and applications. It facilitates the swift granting of user access, ensures that entitlements align with business requirements, and promptly revokes access when it is no longer necessary. In large organizations, users often juggle numerous login IDs, with an average individual accessing between 10 to 20 internal systems, leading to significant operational challenges. To address this complexity, Bravura Identity effectively manages the lifecycles of identities, accounts, groups, and entitlements. Its features include automation for granting and revoking access based on changes detected in systems of record, as well as a web portal for users to request access, update profiles, and complete certification processes. Additionally, it provides full lifecycle management for groups and roles within target systems, alongside a workflow manager that allows for the approval of requests, access reviews, and task completions. The solution also enforces policies related to segregation of duties (SoD), role-based access control (RBAC), risk assessments, privacy safeguards, and more, all supported by comprehensive reporting, dashboards, and analytics capabilities. This holistic approach not only simplifies identity management but also enhances security and compliance across the organization.
  • 3
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID is a distinguished, comprehensive suite for identity management and cloud security, created by The Dot Net Factory, LLC, also known as "EmpowerID". This innovative solution is adept at overseeing millions of identities, both internal and external, across various cloud and on-premise environments for organizations worldwide, offering the most extensive array of IAM functionalities available. Its robust, out-of-the-box offerings encompass features such as single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and a specialized identity platform designed for application developers. Each of these solutions utilizes a sophisticated authorization engine based on roles and attributes, capable of managing complex organizational structures and supporting multi-tenant SaaS providers. EmpowerID's architecture is highly scalable and fully customizable, ensuring that enterprises can achieve efficient and effective IAM results tailored to their specific needs. Ultimately, EmpowerID stands out as an essential tool for organizations looking to streamline identity management while enhancing security protocols.
  • 4
    Oracle Identity Management Reviews
    Oracle Identity Management empowers organizations to efficiently oversee the complete lifecycle of user identities across all enterprise resources, extending beyond the firewall and into cloud environments. This comprehensive platform provides scalable solutions for identity governance, access management, and directory services. By implementing this contemporary system, organizations can enhance security, streamline compliance processes, and seize business opportunities related to mobile and social access. As part of the Oracle Fusion Middleware suite, Oracle Identity Management contributes to increased agility, improved decision-making, and lowered costs and risks in various IT landscapes today. Furthermore, we are excited to introduce a groundbreaking, fully integrated service that encompasses all essential identity and access management functions via a multi-tenant Cloud platform, known as Oracle Identity Cloud Service, which further elevates the user experience and operational efficiency.
  • 5
    midPoint Reviews
    Opt for excellence by joining the multitude of organizations that have embraced midPoint, the leading open-source platform in Identity Governance and Administration. Select the deployment method that suits your needs best: whether in the cloud, hybrid cloud, or on-premise, midPoint offers flexibility. Boost your security and operational efficiency with improved visibility, compliance enforcement, synchronization, and identity oversight. Fulfill regulatory demands effortlessly thanks to midPoint’s robust accountability features, meticulous record-keeping, and comprehensive data protection capabilities. Empower users by giving them control over their personal data through advanced privacy measures and data protection protocols. Improve the user digital experience by allowing them to manage self-service access requests, reset passwords, and edit profiles with ease. Experience the benefits of scalability and convenience that midPoint in the cloud provides, ensuring your organization can grow without constraints. By utilizing third-party specialists for seamless operations, you can save precious time and human resources, allowing your team to focus on strategic initiatives. Harness the full potential of synergy and elevate your organization's identity management to new heights.
  • 6
    Avatier Identity Anywhere Reviews

    Avatier Identity Anywhere

    Avatier

    $5.00/one-time/user
    Introducing Identity Anywhere, an innovative Identity Management solution leveraging Docker containers, which makes it the most flexible, scalable, and secure option available today. Thanks to Docker technology, Identity Anywhere can be deployed across any environment: whether it's on a cloud platform, on-premises, or in a private cloud instance provided by Avatier. Avatier’s Identity Management solutions seamlessly integrate disparate back office applications and resources, allowing them to be overseen as a cohesive system. Equipped with an intuitive digital dashboard, executives at the C-level can achieve significant business growth and enhanced profitability. Say goodbye to the most common Help Desk request with top-tier self-service password reset capabilities. Cut expenses by only purchasing the cloud application licenses that your organization truly requires. Boost overall company efficiency with an exceptional shopping cart experience, while simultaneously safeguarding your business against potential fines, lawsuits, damaging publicity, and even incarceration due to compliance failures. This groundbreaking approach not only enhances operational efficiency but also empowers organizations to thrive in a rapidly evolving digital landscape.
  • 7
    OpenText NetIQ Identity Manager Reviews
    Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority.
  • 8
    SecurEnds Reviews
    SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations.
  • 9
    Saviynt Reviews
    Saviynt offers intelligent identity access management and governance to cloud, hybrid, and on-premise IT infrastructures in order to accelerate enterprise digital transformation. Our platform integrates seamlessly with the most popular IaaS, PaaS and SaaS applications, including AWS Azure, Oracle EBS and SAP HANA. Gartner awarded the Trust Award to our IGA 2.0 advanced risk analysis platform and named it an industry leader.
  • 10
    Systancia Identity Reviews
    Systancia Identity offers a robust solution for managing identities and authorizations across your entire ecosystem, whether in the cloud or on-premises. Formerly known as Avencis Hpliance, this identity governance and administration tool empowers users to oversee identities, their associated organizations, and their permissions, alongside managing resources such as endowments. Its Workflow module is designed to handle a variety of use cases, including the flow of personnel, processes, and requests for authorizations or resources. Equipped with an agile synchronization engine, it seamlessly integrates with both upstream and downstream repositories, ensuring smooth operations. Additional features include permission certification and the separation of duties (SoD), which enhance security by providing traceability and visibility through an extensive audit and reporting module. Users find Systancia Identity particularly friendly and intuitive, making it easy to adopt after the initial setup is complete, thus fostering a swift transition for teams. Overall, this solution stands out for its comprehensive approach to identity management and its user-centered design.
  • 11
    Sonrai Security Reviews
    Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups.
  • 12
    IBM Verify Governance Reviews
    IBM Verify Governance empowers organizations to manage, audit, and report on user access and activities with its lifecycle, compliance, and analytical features. It is essential for businesses to comprehend the extent of user access and the manner in which this access is utilized. Is your identity governance system functioning effectively? IBM is dedicated to gathering and evaluating identity data to enhance enterprise IT operations and ensure adherence to regulatory standards. By utilizing IBM Verify Governance, organizations can gain insights into access usage, prioritize compliance initiatives through risk-based analysis, and make informed decisions based on actionable intelligence. This solution's unique approach to risk modeling, which is centered around business activities, sets IBM apart and simplifies the process for auditors and compliance officers. Additionally, it facilitates streamlined provisioning and self-service requests, allowing for efficient onboarding, offboarding, and management of personnel. Overall, IBM Verify Governance serves as a comprehensive tool that not only enhances security but also improves operational efficiency within organizations.
  • 13
    Clear Skye IGA Reviews
    Organizations need to understand and manage who has access to what across their entire IT ecosystem: cloud and on-premises application stack, infrastructure, DevOps pipelines. This is important for both external (regulatory compliance) and internal (security and risk management, employee experience and productivity) reasons. Legacy identity solutions have not met the needs of modern organizations with over 50% of Identity Governance programs being in distress and more than 75% looking to replace their current solution (Source: Gartner). They are unable to keep pace with shifts in business due to digital transformation and the rise of the business platform. Clear Skye, the only identity governance and security solution built natively on ServiceNow, optimizes enterprise identity and risk management with a platform-first approach. The company provides workflow management, access requests, access review, and identity lifecycle management tools to a broad set of vertical markets. By leveraging an existing ​business platform, Clear Skye enables customers to ​reduce friction and IT hurdles, while improving workflows and user experience.
  • 14
    OpenText NetIQ Identity Governance Reviews
    Manage the access to applications and data throughout your varied enterprise infrastructure. Regardless of whether you opt for an on-premises setup or a SaaS solution, you will receive comprehensive features that align with what you would anticipate from a contemporary identity governance platform. Identify who has access to essential applications and data, whether located on-site or in the cloud. By utilizing Identity Governance, you can aggregate and visualize identities and entitlements across your entire ecosystem, gaining insights into who has access to what, the individuals who authorized that access, and the rationale behind such approvals. This approach ensures teams remain efficient by granting precise and prompt access to applications and data throughout your multifaceted IT environment. Furthermore, Identity Governance alleviates the burden on your IT personnel and application managers, eliminating the need for them to oversee entitlements in every individual application and platform. You will benefit from an intuitive, self-service system for access requests and approvals, supported by automated fulfillment processes for the most frequently utilized applications, ultimately streamlining operations across your organization. Additionally, this solution enhances accountability and security by providing clear documentation of access rights and the approval process.
  • 15
    IBM Security zSecure Reviews
    The IBM® zSecure Suite provides multiple layers of security assurance, including auditing, alerting, administration, reporting, and authentication, which significantly improve security and risk management across IBM Z® hardware, software, virtualization, and popular external security managers (ESMs) like IBM RACF, CA ACF2, and CA Top Secret. By automating security administrative functions, the zSecure Suite enhances operational efficiency while minimizing the risk of human error, effectively identifying both internal and external threats, generating immediate alerts, and ensuring compliance with applicable standards. This suite not only automates key tasks but also plays a vital role in managing identity governance, which is crucial for adherence to regulatory requirements. Furthermore, it proactively detects threats, delivers real-time notifications, and monitors compliance with practices such as pervasive encryption to meet GDPR mandates. Additionally, it fortifies authentication processes to enhance user access controls, facilitating streamlined administration for security teams. Overall, the IBM zSecure Suite is a comprehensive solution that addresses the evolving security landscape.
  • 16
    SPHEREboard Reviews

    SPHEREboard

    SPHERE Technology Solutions

    SPHEREboard offers a comprehensive solution that enables you to grasp the current status of your environment, automate data collection, pinpoint immediate threats, and effectively address them. Our unique methodology is deeply integrated into the SPHEREboard's design and operational processes. With SPHEREboard, you can easily manage your inventory, highlight all vulnerabilities, and create tailored Control Scorecards. Gain a complete view of insights across your unstructured data, whether stored on-premise or in the cloud. You can also proactively designate responsibilities and initiate campaigns to uphold Zero Trust principles. Addressing access control breaches can be handled at scale through Virtual Workers, complete with accurate tracking and reporting features. Recognizing that there isn’t a universal solution for identifying ownership accurately, SPHEREboard simplifies this with an intuitive interface that incorporates our business logic across your unstructured data while allowing you to establish your own rules. This flexibility ensures that any incorrect ownership issues in your records can be efficiently resolved, preventing future ownership discrepancies and fostering a more reliable data management framework. By leveraging SPHEREboard's capabilities, organizations can streamline their compliance processes and enhance overall data governance.
  • 17
    Lumos Reviews
    Lumos serves as a company's internal AppStore, streamlining access requests, reviews, and license management through a self-service platform. By automating access requests, approvals, and provisioning, organizations can significantly reduce the number of support tickets they receive. This not only enhances visibility into all SaaS applications and associated spending but also facilitates the removal of unused licenses through automated workflows. As businesses expand their workforce and adapt to remote working conditions, the influx of help desk tickets related to app access and permission requests can become overwhelming. With Lumos, you can manage permissions and approve access durations directly within Slack, ensuring a smoother process. Prior to a new hire's start date, Lumos will alert their manager and assist in setting up all necessary applications for them. It’s important to recognize that not all employees require access to every application; therefore, Lumos allows you to customize the AppStore according to specific employee roles, helping to streamline operations and minimize potential complications. By implementing Lumos, organizations can enhance efficiency and focus on what truly matters—driving success.
  • 18
    BAAR-IGA Reviews

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates your environment's administration, governance, and identity. Legacy applications, mainframes, as well as new-age applications can all be used by BAARIGA. BAARIGA will act on new users, terminated users, and a change to user (e.g. In an automated manner, BAARIGA will act on new users, terminated users, and a change to a user (e.g. designation change). This includes the creation of an ID and email ID, as well as purchasing licenses. Access provisioning is available to applications that use Active Directory for authentication and authorization as well as applications which self-authenticate users. Both legacy and new age apps are supported. Automated user access review. BAARIGA has data collection points that can collect access information directly from applications. If necessary, access can be revoked automatically. Single sign-on is available for legacy and compliant applications. The SSO component in BAARIGA allows users to only need one password. BAARIGA will check to determine if users have different roles in applications.
  • 19
    Token Reviews
    Token Security presents an innovative strategy tailored for the booming era of Non-Human Identities (NHI), emphasizing a machine-first approach to identity security. In today's digital landscape, identities are omnipresent and often unmanaged; they manifest as machines, applications, services, and workloads, continuously generated by various sources throughout the day. The intricate and sluggish nature of managing these identities has resulted in an attack surface that organizations find difficult to navigate. Rather than concentrating solely on human identities, Token prioritizes the resources being accessed, swiftly revealing who accesses which resources, identifying vulnerabilities, and ensuring security without disrupting operations. Furthermore, Token adeptly identifies all identities across cloud environments, seamlessly integrating intricate components such as Kubernetes, databases, servers, and containers, thereby consolidating relevant identity data into a cohesive perspective. This comprehensive approach not only enhances security but also simplifies the management of identities within increasingly complex infrastructures.
  • 20
    Evidian Reviews
    In the modern digital landscape, individuals anticipate the same ease of use in their professional environments as they enjoy in their personal lives. Evidian IDaaS enables users to authenticate a single time, allowing seamless access to all authorized web resources. This enhancement not only boosts user satisfaction but also elevates the overall security posture; every password eliminated reduces potential attack vectors. Additionally, Evidian IDaaS seamlessly connects both your on-premise and cloud applications with its Transparent SSO solution, ensuring a cohesive user experience across all platforms. By streamlining authentication processes, organizations can focus more on productivity while mitigating security risks.
  • 21
    RAC/M Identity Reviews
    RAC/M Identity™ serves as a straightforward and efficient Identity Governance and Administration (IGA) solution, allowing organizations of any size to comprehend and oversee the intricate connections between users and their access to both physical and digital resources, whether they are hosted on-site or in the cloud. This solution is fundamental for establishing a robust Identity and Access Management (IAM) program capable of overcoming significant obstacles, including resource limitations, budget constraints, tight deadlines, and a multifaceted technological and business environment. Additionally, RAC/M Identity™ tackles one of the most significant hurdles that IAM initiatives face: securing ongoing executive backing. It automatically computes a comprehensive health score that indicates the maturity and efficiency of essential IAM processes, which enables executives to evaluate both the advancements achieved and the challenges that lie ahead during the implementation journey. By consistently detecting and addressing potential risks, such as orphaned or unauthorized accounts, and enforcing Segregation of Duties (SoD) policies, it effectively minimizes risk and ensures that unnecessary access is promptly revoked. Consequently, organizations can foster a more secure and compliant environment, ultimately bolstering their overall security posture.
  • 22
    Deep Identity Reviews
    Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc
  • 23
    Ilantus Compact Identity Reviews
    For the first time, there exists a fully integrated IAM solution that is thorough, extensive, and accessible even to those without an IT background. This offering encompasses both Access Management and Identity Governance and Administration. A distinctive online digital guidance system is available to facilitate the implementation process step-by-step, allowing users to proceed at their own speed. In contrast to other providers, Ilantus additionally supplies tailored implementation support at no additional cost. The solution features seamless single sign-on (SSO) capabilities, ensuring that no application is overlooked, including both on-premises and thick-client applications. Whether your needs encompass web apps, federated or non-federated systems, thick-client setups, legacy applications, or custom solutions, all will be integrated into your SSO environment. Furthermore, mobile applications and IoT devices are included, ensuring comprehensive coverage. If you have a proprietary application, our interactive digital help guide will assist in the process, making integration straightforward. Additionally, should you require further help, Ilantus provides a dedicated helpline that operates 24/7 from Monday to Friday, ready to assist with any integration tasks you may have. This commitment to support ensures that users can confidently navigate their IAM journey without feeling overwhelmed.
  • 24
    Fischer Identity Reviews

    Fischer Identity

    Fischer International Identity

    Fischer enables organizations to establish a robust, predictable, and secure Global Identity® Architecture. At this moment, ensuring the security of an Identity Program is the top priority. Fischer Identity offers both hardware and software solutions along with Global Identity® Services aimed at safeguarding and managing IT resources effectively. Utilize our plug-and-play automation to facilitate reliable and secure provisioning, granting your identities the necessary access from day one while also allowing for on-demand deprovisioning of access. By automating processes the Fischer way, you can reduce dependency on professional services. Our governance framework equips you with the necessary oversight to maintain compliance across your organization. You will always have visibility into who has access to which resources, how they acquired that access, and the steps for remediation when issues arise. With Fischer Identity lifecycle management, you can accelerate your digital transformation and ensure that your identity management processes are both efficient and secure. The future of identity management is here, paving the way for organizations to thrive in a digital landscape.
  • 25
    Imprivata Reviews
    Imprivata stands as the premier digital identity firm in the healthcare sector. Our expertise in navigating the intricate and diverse workflows of healthcare and IT systems has positioned us as the leading authority in reliable digital identity management for health delivery entities. We provide a range of solutions, including enterprise access, multifactor authentication, identity governance, and patient identification, which have all been created in collaboration with clinicians to prioritize both security and operational efficiency. Underpinning our offerings is the Imprivata digital identity framework, a cohesive strategy designed to enhance security and streamline identity management throughout healthcare organizations. By focusing on these critical elements, we ensure that our clients can operate with confidence in their identity management systems.