Best Identity Management Software in New Zealand - Page 11

Find and compare the best Identity Management software in New Zealand in 2025

Use the comparison tool below to compare the top Identity Management software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Simeio Reviews
    Simeio offers the best Identity and Access Management (IAM), which engages securely with anyone, anywhere and anytime with an unmatched "service first" philosophy. We can help you protect your customers, partners, and employees identities. Our job is to make access easy, reliable, and secure, wherever you are, in all areas of banking, hospitality and healthcare, as well as government and universities. We can also protect your brand reputation by protecting identities. To create a platform of exceptional reliability and security, we partner with, leverage, and interoperate solutions from the industry's most trusted businesses. Yes, our work is complex and specialized. You can let us handle all the complexity. We simplify the way your company manages identity.
  • 2
    Deep Identity Reviews
    Deep Identity allows you to protect your company with a full range of Deep Identity integration products and data governance products. Lightweight, flexible, and open architecture. Trusted Identity Audit & Compliance Manager is the industry's best solution. It provides a layered approach to identity governance and administration. Trusted identity manager (Trusted IM), the industry's lightest solution, provides a "layered approach" to identity administration. Privilege Management Manager (Trusted PIM), is the most practical and non-intrusive solution in the industry to address any privilege identity related problems in any organization. Data Governance Manager (TrustedDGM) offers complete automation for identity, data access governance, and lifecycle management. It integrates across modules and systems. Manage full-time contractors profile management, Access review and N Level approval workflow, Self Service and Bulk Provisioning etc
  • 3
    HORACIUS IAM Reviews
    The efficiency of business operations is closely tied to how access rights to systems are managed, making the selection of a robust Identity Access Management (IAM) platform a critical strategic choice that can mitigate costs and risks while enhancing overall productivity within the organization. It begs the question: how can you guarantee that every user in your company possesses only the necessary levels of access, applications, data, and transaction capabilities? Moreover, the IAM platform's ability to seamlessly integrate with key Human Resources systems allows for the synchronization of vital information and the execution of crucial tasks essential for business continuity. This comprehensive management of user access history begins from the moment an employee joins the organization, extending all the way to the point when access rights are revoked upon their departure. Ultimately, investing in an effective IAM solution not only safeguards sensitive information but also streamlines operational workflows, fostering a secure and efficient working environment.
  • 4
    IDReset Reviews

    IDReset

    Interactive Northwest

    Self-service password reset tools are intended to reduce the burden on helpdesk teams by offering a secure way for users to reset their accounts independently, either online or via phone. INI presents automated password reset solutions tailored to both the security requirements of an organization and the needs of its users. The cost of helpdesk calls averages between $10 and $30, which can add up significantly over time. By implementing a self-service password reset application, organizations can often achieve a return on investment that covers the cost of the application within just the first year of operation. The time saved across various departments—including users, helpdesk staff, IT, finance, and security—results in considerable productivity improvements that benefit the organization’s financial health. Additionally, this approach enhances security by eliminating the need for an agent to be involved in the authentication process, while also providing users with round-the-clock access for added convenience. Furthermore, organizations can maximize their ROI by reducing the number of costly helpdesk calls by 20% to 40%, allowing helpdesk personnel to focus on more critical tasks. Ultimately, this integration not only streamlines operations but also fortifies overall security measures within the organization.
  • 5
    CI Badge Reviews
    The CI Badge program is an advanced solution for issuing ID cards, catering to the needs of countless users with its adaptable image capture, strong data integration, and boundless card printing capabilities, all designed to streamline the intricate process of secure ID card creation. Each iteration of our CI Badge Card Printing Software is tailored specifically to meet your unique printing requirements, ensuring that we provide the most effective long-term strategy for your organization. Initiate your card printing journey by arranging a demonstration with us today. With CI Badge, you can effortlessly look up a record, take a photo, and print your card. This innovative software seamlessly connects your camera, card printer, and database, allowing you to efficiently process print jobs directly from the CI Badge interface. Additionally, importing your existing database into CI Badge is a straightforward task, making it easy to manage records. Simply search for a record, capture an image if necessary, and hit print to produce your ID cards without hassle.
  • 6
    Ilantus Compact Identity Reviews
    For the first time, there exists a fully integrated IAM solution that is thorough, extensive, and accessible even to those without an IT background. This offering encompasses both Access Management and Identity Governance and Administration. A distinctive online digital guidance system is available to facilitate the implementation process step-by-step, allowing users to proceed at their own speed. In contrast to other providers, Ilantus additionally supplies tailored implementation support at no additional cost. The solution features seamless single sign-on (SSO) capabilities, ensuring that no application is overlooked, including both on-premises and thick-client applications. Whether your needs encompass web apps, federated or non-federated systems, thick-client setups, legacy applications, or custom solutions, all will be integrated into your SSO environment. Furthermore, mobile applications and IoT devices are included, ensuring comprehensive coverage. If you have a proprietary application, our interactive digital help guide will assist in the process, making integration straightforward. Additionally, should you require further help, Ilantus provides a dedicated helpline that operates 24/7 from Monday to Friday, ready to assist with any integration tasks you may have. This commitment to support ensures that users can confidently navigate their IAM journey without feeling overwhelmed.
  • 7
    OneID Reviews

    OneID

    OneID Global Technologies

    OnelD simplifies the identity verification process for your customers according to your specified requirements. Its seamless integration enhances your platform while ensuring compliance, increasing conversion rates, and fostering trust among users. You retain control over the personal information shared during online and in-person identity verification. After a single verification, users can utilize their smartphones as identification, streamlining the onboarding process. Customers gain access to a range of financial services, allowing them to make transactions and withdrawals without the hassle of physical cards. The system also enables a rapid and automated check-in at airports, eliminating the need for long lines or staff assistance. In addition, educational institutions can generate digital identities for students, providing them with electronic access to course materials, tracking attendance, and facilitating exam check-ins, all in a convenient and efficient manner.
  • 8
    Fischer Identity Reviews

    Fischer Identity

    Fischer International Identity

    Fischer enables organizations to establish a robust, predictable, and secure Global Identity® Architecture. At this moment, ensuring the security of an Identity Program is the top priority. Fischer Identity offers both hardware and software solutions along with Global Identity® Services aimed at safeguarding and managing IT resources effectively. Utilize our plug-and-play automation to facilitate reliable and secure provisioning, granting your identities the necessary access from day one while also allowing for on-demand deprovisioning of access. By automating processes the Fischer way, you can reduce dependency on professional services. Our governance framework equips you with the necessary oversight to maintain compliance across your organization. You will always have visibility into who has access to which resources, how they acquired that access, and the steps for remediation when issues arise. With Fischer Identity lifecycle management, you can accelerate your digital transformation and ensure that your identity management processes are both efficient and secure. The future of identity management is here, paving the way for organizations to thrive in a digital landscape.
  • 9
    OpenText Business Network Reviews
    Seamlessly unite individuals, systems, and devices throughout comprehensive business ecosystems. By linking knowledgeable professionals, effective methodologies, and cutting-edge technologies, organizations can achieve efficient connectivity, secure teamwork, and immediate insights across an evolving array of internal networks, cloud solutions, partner communities, and smart devices. On a unified platform, facilitate the smooth exchange of digital business information among various stakeholders. Utilize sophisticated visibility tools to scrutinize both internal and external data streams, enabling organizations to make informed decisions. Establish a robust digital framework to support upcoming digital transformation efforts. OpenText™ Business Network stands out as a leading cloud solution that securely integrates information with people, systems, and devices, both within the organization and beyond its security perimeter, enhancing operational processes and providing fresh insights that grant a competitive edge. This integration fosters an environment of innovation and adaptability, essential for thriving in today’s rapidly evolving business landscape.
  • 10
    Vanguard Authenticator Reviews

    Vanguard Authenticator

    Vanguard Integrity Professionals

    Vanguard Authenticator allows enterprises to manage authorization and authentication in a modular, scalable and integrated manner.
  • 11
    Imprivata Reviews
    Imprivata stands as the premier digital identity firm in the healthcare sector. Our expertise in navigating the intricate and diverse workflows of healthcare and IT systems has positioned us as the leading authority in reliable digital identity management for health delivery entities. We provide a range of solutions, including enterprise access, multifactor authentication, identity governance, and patient identification, which have all been created in collaboration with clinicians to prioritize both security and operational efficiency. Underpinning our offerings is the Imprivata digital identity framework, a cohesive strategy designed to enhance security and streamline identity management throughout healthcare organizations. By focusing on these critical elements, we ensure that our clients can operate with confidence in their identity management systems.
  • 12
    DNI IDM Reviews

    DNI IDM

    DotNet Internals

    The DNI Cloud Platform operates as a cloud-based service that is hosted on Microsoft Azure. It is built on an entirely new framework and employs a microservice architecture that incorporates GDPR compliance. This architecture allows for the separation of services, enabling them to operate independently from one another. As a result, the overall complexity of the system is reduced while enhancing both flexibility and security. By utilizing this microservice structure, the platform effectively circumvents the limitations associated with traditional monolithic architectures, where all components are interconnected within a single, large system. This design allows for updates and modifications to individual functions without disrupting the entire platform. Additionally, users can take advantage of the numerous benefits that cloud computing offers, including enhanced scalability, greater flexibility, and improved automation capabilities, making the platform adaptable to evolving needs. Consequently, organizations can leverage this innovative architecture to better meet their operational requirements.
  • 13
    ForgeRock Reviews
    The only AI-driven platform that combines all aspects of identity, governance and access management to dramatically improve and scale, it is the only one in the industry. Digital access is essential for our personal, professional, and educational lives. It is essential to accelerate digital transformation, provide superior experiences, and ensure the highest level of security in order to meet customer demand and keep up with our competitors. ForgeRock helps people connect to the world safely and easily by helping organizations improve and scale their identity, governance and access management. ForgeRock is the only AI-driven platform that offers a full suite of AI-driven solutions. It is designed for all types of identities (consumers and workers, as well as things). ForgeRock's simple-to-use, comprehensive solutions will help you increase revenue, manage risk, increase workforce productivity, and lower costs.
  • 14
    IDSync Reviews
    The Active Directory to Active Directory Identity Synchronizer Software addresses issues related to password sharing, excessive privileges granted to IT personnel, and facilitates the enabling or disabling of users within a customer's Active Directory. This innovative platform allows Managed Service Providers (MSPs) to seamlessly link their on-premise Active Directory with the Active Directories of their clients, streamlining the processes of provisioning and synchronizing user credentials and metadata for technicians who require access to client networks. Through the IDSync interface, MSPs can easily pinpoint the technicians needing provisioning and specify the target Active Directories for their onboarding or offboarding. Furthermore, the software supports both individual user provisioning and bulk operations through the use of security groups, enhancing efficiency and security management across multiple systems. By implementing this solution, organizations can significantly reduce the risk of unauthorized access and improve overall administrative control.
  • 15
    Assently CoreID Reviews
    Facilitate identity verification using various Nordic electronic IDs, including Swedish BankID, Norwegian BankID, Danish NemID, or the Finnish Trust Network. CoreID seamlessly integrates into your systems across multiple platforms, allowing you to eliminate time spent on infrastructure, maintenance, and upgrades. Enhance your online security measures while providing contemporary authentication solutions for your clients through the use of electronic IDs. Customers can easily authenticate themselves using Swedish BankID, Norwegian BankID, Danish NemID, or Finnish Trust Network, regardless of the device they are using. Assently adheres to GDPR regulations and holds ISO 27001 certification, which is the recognized international benchmark for information security. With Assently's advanced identification solution, CoreID, you can efficiently verify your customers' identities via electronic IDs. CoreID is also designed to be easily tailored and set up according to your specific requirements, allowing you to select which countries' electronic IDs to activate. You can implement Assently CoreID across any device, whether it's a mobile phone, tablet, or desktop, ensuring a versatile user experience on your website. This flexible solution empowers businesses to meet their identity verification needs while maintaining high security standards.
  • 16
    Transmit Security Reviews
    The Future of Authentication is Passwordless Agile. Instant. Flexible. You can eliminate passwords and deliver identity experiences that delight all your users. Anywhere, anytime. Secure and seamless customer authentication via any device or channel. The mobile can be used as an authenticator. A network of trust is used to identify each user. This technology and installation provides the best experience and impact. Transform complex authorization, authorization, and risk policy decisions into simple trips. Flexible policy orchestration engine that works with all applications and channels. Protect your workforce and workplace, whether you are at work or away. Enjoy the benefits of risk-based technology that provides unbreakable security regardless of where you are located. Passwordless technology will make your enterprise more secure.
  • 17
    One Identity Reviews
    Eliminate the uncertainties associated with enterprise identity and access management by effectively reducing risks, safeguarding data, ensuring uptime, and fulfilling compliance requirements through tailored access for your users. Now, your approach to identity and access management (IAM) can align with business objectives rather than being limited by IT constraints. With Identity Manager, you can integrate security policies and meet governance demands for both the present and the future. At last, there's identity management software focused on the needs of the business rather than solely on IT capabilities. Identity Manager not only secures and governs your organization’s data and user access, but it also guarantees uptime, mitigates risks, and ensures compliance by providing users with precisely the access they require to data and applications, regardless of whether they are on-premises, hybrid, or cloud-based. Additionally, it helps you meet compliance and audit standards effectively. This comprehensive solution empowers organizations to maintain control over their identity management processes while adapting to evolving business requirements.
  • 18
    Entrust Identity as a Service Reviews
    Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats.
  • 19
    Anytrust Reviews
    We are experts in identity management and can help you with OneIdentity and Microsoft Identity Manager (MIM). You can migrate to the cloud with our assistance and get started using Azure AD & Intune. Are you looking for help in managing authorizations and identity management for your company? Smartsmiling's onboarding project gives you greater control and insight into your company's affiliations and permissions. Our platform allows you to manage and control your identity management processes and regulations. We use OneIdentity and Microsoft identity Manager for our identity management projects. We will recommend the platform that best suits your needs.
  • 20
    Keycloak Reviews
    Keycloak serves as a robust open-source solution for managing identity and access. It simplifies the process of adding authentication to applications and securing services, eliminating the hassle of user management and authentication, which are readily provided out of the box. Users can take advantage of sophisticated features like User Federation, Identity Brokering, and Social Login. To explore further, be sure to check the official documentation and consider giving Keycloak a try; its user-friendly design makes implementation straightforward. With its extensive capabilities, Keycloak stands out as an excellent choice for developers seeking efficient identity management.
  • 21
    LetFaster Reviews
    LetFaster specializes in cloud-based, automated Biometric Identification Screening, Fraud Detection, and Tenant Screening. Our proprietary Facial Recognition, Motion Detection and Liveness algorithms authenticate global identity documents using advanced AI and OCR technologies. Fake IDs are not easy to spot. Fake IDs would pass all background screening, so organisations are at risk of fraud or AML violations. Key Benefits: * In-Depth Tenant Screening * In-House SaaS Portal is Not an Outsourced Solution * Detect Internal and External Fraud * Key-Based 2-Factor Authentication (securer than SMS Verification). * Increase Internal Controls * Automate Workflows: Operational Efficiencies * Automated Set-Up: Offices/Properties/Buildings/Owners * Easy to use: No training required * Audit Trail * Business Intelligence * No forced tie-ups * There are no significant up-front fees
  • 22
    Zeotap Reviews
    Zeotap is a Customer Intelligence Platform, (CIP). It helps companies better understand their customers to predict their behavior and make more meaningful investments. Our platform allows brands to leverage a core of first-party data to win new clients and grow their customer base. Our modules are independent but integrate and include customer data unification, identity resolution (including in data clean rooms), enrichment, modeling, and activation to more than 100 partners in the marketing ecosystem. Gartner has named us a "Cool Vendor" in 2020 and AdExchanger the "Best Data-Enabling Technology” in 2019. Our platform meets the highest standards for enterprise data privacy and security, including ISO 27001 and CSA STAR. We serve top brands, publishers, and agencies in more than a dozen countries in Europe and North America. Zeotap is also a founding member of ID+, an initiative for universal marketing ID.
  • 23
    AIKON Reviews
    Protecting user identities through Blockchain technology has never been easier with an Identity as a Service that adheres to GDPR and CCPA regulations while linking businesses with vital public blockchains such as Algorand, EOS, and Ethereum. This innovative service enables management of various blockchains through a single platform, allowing AIKON to facilitate economical connections for businesses to multiple blockchain systems while integrating seamlessly with their current technology frameworks. Transitioning customers onto the blockchain is effortless, with options for login via email, phone, or social media. Organizations can even register users on their behalf, utilizing a ready-to-use, API-driven solution that operates across different blockchain networks. Existing engineering teams can continue to work without the need for new hires or extensive training, as all necessary features are incorporated to ensure compliance with GDPR and CCPA regulations for all users. With a blockchain-based framework, access and data remain secure and distinct, while enabling the creation of native blockchain accounts with simplicity. Users can register in familiar ways, leveraging social media, email, or SMS logins, enhancing user experience and accessibility. By prioritizing user-friendly sign-up processes, businesses can effectively engage their clients in the blockchain ecosystem.
  • 24
    Jellyfish Reviews
    Jellyfish has been designed as a versatile modular solution. We have made substantial advancements in managing identity, credentials, access, and various security products through the development of a collection of connectors known as Cognectors. These innovative connectors facilitate the establishment of automated workflows, transfer data across different systems, and allow triggers from one platform (such as PACS) to impact another (like LACS). The Cognectors channel information from diverse systems into the Service Bus, resulting in numerous advantages, including improved monitoring and activity reporting. As personnel join, shift roles, or exit an organization, access to systems and physical locations can be effortlessly modified through existing HR processes. Jellyfish employs contemporary authentication protocols and offers adaptive support to ensure compatibility with both logical and physical access control systems. By prioritizing future-proof security measures, Jellyfish adopts emerging standards and multi-factor authentication to enhance overall safety. This commitment not only streamlines access management but also positions organizations to adapt to evolving security challenges effectively.
  • 25
    Core Security Access Assurance Suite Reviews
    The Access Assurance Suite, part of the Core Security Identity Governance and Administration solutions formerly recognized as Courion, is a sophisticated identity and access management (IAM) software system that empowers organizations to facilitate informed provisioning, ensure continuous regulatory compliance, and utilize actionable analytics for enhanced identity governance. This suite consists of four leading-edge modules, providing an intelligent and efficient strategy for reducing identity-related risks while offering a comprehensive solution for optimizing the provisioning workflow, assessing access requests, managing compliance, and enforcing stringent password policies. Additionally, it features a user-friendly web portal where end users can easily request access, and managers have the ability to review and either approve or deny those requests. Adopting a shopping cart model, Core Access enhances the overall experience by streamlining processes and eliminating the need for cumbersome paper forms, emails, and tickets traditionally used for access management. This modern approach not only improves efficiency but also fosters better communication between users and administrators.