Best Identity Management Software in New Zealand - Page 6

Find and compare the best Identity Management software in New Zealand in 2025

Use the comparison tool below to compare the top Identity Management software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Juniper Identity Management Service Reviews
    Ensuring the protection of corporate data ranks as one of the highest priorities in security management. Insiders who have direct access to sensitive information can easily exploit inadequate user controls. To effectively safeguard corporate resources, it is essential to implement and enforce user access policies across all platforms, including enterprise systems, mobile devices, and cloud environments. The Juniper Identity Management Service plays a vital role in enhancing enterprise security by authenticating users and regulating their access. Acting as the primary barrier against corporate breaches, it helps to protect valuable assets. Employees are clearly identified and assigned specific corporate roles, which dictate their access to various applications and data. This service works seamlessly with SRX Series next-generation firewalls, allowing security teams to align application activities and security policies with the designated user roles. Furthermore, it can produce comprehensive user metrics and audit reports, providing in-depth insights for reporting and analysis. By implementing such a system, organizations can significantly reduce security risks and enhance their overall security posture.
  • 2
    Deepnet DualShield Reviews
    If you're in search of a robust enterprise-level solution for two-factor authentication (2FA) or multi-factor authentication (MFA) that can effectively protect a variety of popular business applications while offering numerous authentication options, you've come to the right spot. Deepnet DualShield stands out as a comprehensive multi-factor authentication platform that integrates multiple authentication techniques, protocols, and user experiences seamlessly. Beyond its core MFA capabilities, DualShield also features self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM), and Adaptive Authentication functionalities. This system is recognized as one of the most effective and adaptable multi-factor authentication solutions available globally. Furthermore, Deepnet DualShield can be deployed either on-site or within a private cloud environment, granting you complete oversight of your user authentication processes and ensuring that your users' identities and credentials remain secure. With its versatility, DualShield not only enhances security but also streamlines user access across your organization.
  • 3
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 4
    Huawei IAM Reviews
    Establish IAM users and groups while granting them specific permissions through the use of policies and roles to control access to designated services and resources. You can allow a trusted HUAWEI CLOUD account or a cloud service to access your resources according to the permissions that have been assigned. Furthermore, create a trust relationship between your current identity system and HUAWEI CLOUD by implementing a SAML-based or OpenID Connect-based identity provider, or by utilizing a custom identity broker. This setup enables users within your organization to log in to HUAWEI CLOUD seamlessly via single sign-on (SSO). Additionally, you may require IAM users to undergo identity verification each time they log in or engage in significant activities to enhance security. The IAM service empowers you to create users and authorize secure resource access via their unique usernames and passwords, while also enabling the authorization of another HUAWEI CLOUD account or a cloud service to utilize your resources under the defined permissions. In doing so, you ensure a robust and secure management of access to your cloud resources.
  • 5
    Approw Reviews

    Approw

    Approw

    $19 per month
    Approw is an easy to use, adaptable authorization and authentication platform that can be used with many on-premises applications. Approw focuses on identity and creates a social infrastructure to allow identity sharing across all SaaS users and software. This helps companies create a secure modern IT infrastructure that protects their business and redefines the user experience. Multi-factor authentication (MFA), a simple and effective security method that goes beyond usernames or passwords, adds an additional layer of security. U-Shield is for banks, and off-site login requires SMS verification. Empower Approw applications can quickly enable multifactor authentication (MFA) and improve access security and authentication levels. Multi-factor authentication that is "adaptive" can be used in lieu of traditional multi-factor authentication. It can also choose to use different MFA methods depending on the security situation.
  • 6
    Catalyst Cloud Reviews

    Catalyst Cloud

    Catalyst Cloud

    $0.017 per hour
    As the leading local innovator in true cloud computing within New Zealand, we are dedicated to enhancing accessibility in the cloud to propel the growth of Aotearoa's digital economy. Getting started with our services is seamless, featuring pay-as-you-go options, tailored services, standardized APIs, and an intuitive web dashboard that allows for easy scaling as your needs evolve. We invite you to explore our offerings by signing up for a complimentary trial. Being pioneers in New Zealand, we were the first to launch a CNCF certified Kubernetes service, as well as the first to incorporate the five key characteristics of cloud computing as defined by NIST. We have merely begun to explore the vast potential of cloud technology, and our ambitions extend far beyond this initial stage. As proud advocates of the open source movement, we firmly believe that open standards provide exceptional value and freedom to our users. Our cloud infrastructure is built on OpenStack and supports an open API standard that is widely adopted by numerous cloud service providers around the globe. Additionally, we are constantly striving to enhance our offerings and foster innovation in the cloud space.
  • 7
    aapi Reviews

    aapi

    aapi

    $4 per user per month
    Enhance the identity experiences across various applications to ensure they are more seamless, secure, compliant, and productive. By automatically incorporating the appropriate real-time actions, users and teams can efficiently interact with data in downstream applications with just a single click. This next-generation technology offers granular access to specific functions within applications, going beyond traditional PAM and CASB solutions to achieve genuine zero trust. Events such as identity provisioning and detection of suspicious activity are managed by AAPI, which automates responses related to identity, applications, and security. Furthermore, AAPI seamlessly integrates the right real-time actions for users and teams, allowing them to easily engage with data in their selected applications while being safeguarded by your IAM. Users are granted access solely to the features they require within the applications, ensuring that all other aspects remain protected and secure, all managed through your IAM. This streamlined approach significantly enhances the overall efficiency and security of identity management processes.
  • 8
    Access Auditor Reviews

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 9
    Incode Omni Reviews

    Incode Omni

    Incode Technologies

    varies
    Our flagship identity solution, Incode Omni introduces a new generation of authentication and verification systems that automate the management of transactions. We use advanced Artificial Intelligence (AI) and Machine Learning (ML), along with User-centric design principles, to create a user-centric experience by enabling personalized interactions in multiple domains. An advanced Identity Management System allows banks to increase their revenue while reducing fraud, while providing convenience and outstanding experiences for users.
  • 10
    C2 Identity Reviews

    C2 Identity

    Synology C2

    $19.99 per month
    Effortlessly manage user access to organizational resources with group administration features. You can access the admin console via a web browser to oversee both individual users and groups. Allow users to take control of their own credentials and personal data through a self-service portal. Centrally coordinate users, groups, workstations, and single sign-on (SSO) capabilities for Software as a Service (SaaS) offerings throughout your business. Transition users seamlessly from an LDAP server, Windows Active Directory, Microsoft 365, Google Workspace, or by uploading a CSV file. Lighten the burden on IT teams by empowering users to reset their passwords, update their secondary email addresses, phone numbers, and physical addresses, among other details. Establish on-premises LDAP servers to facilitate rapid local authentication. Optimize the authentication process for SaaS applications using SSO and efficient user account setups. With C2 Identity's low-latency hybrid architecture, you can achieve swift offline authentication through local LDAP servers, ensuring a smooth user experience. This comprehensive approach not only enhances security but also improves user satisfaction.
  • 11
    VIDchain Reviews
    The issue of digital identity has been a longstanding concern. Ever since the onset of the internet era, ensuring the absolute authenticity of individuals' identities in the digital realm has posed significant challenges for both users, who often find their privacy compromised and their control over personal information diminished, and companies, which face the financial burden of frequent security breaches related to identity verification. VIDchain addresses this issue by providing a decentralized self-sovereign identity (SSI) service that leverages blockchain technology, empowering individuals to manage their own identities and enabling secure access to various online services. This innovative solution streamlines processes and lowers the costs associated with identity verification. Furthermore, it employs robust identification protocols and bolsters anti-fraud initiatives while adhering to regulations such as eIDAS and GDPR. By utilizing standards that render numerous credentials unnecessary, users can effortlessly confirm their digital identity with any desired party. Ultimately, this approach enhances trust and security in online interactions.
  • 12
    Microsoft Entra Reviews
    Confidently facilitate smarter, immediate access decisions for all identities across various hybrid and multicloud environments. Protect your organization by securing access to every application and resource for each user. Effectively safeguard every identity, including employees, customers, partners, applications, devices, and workloads, across all settings. Identify and adjust permissions, manage access lifecycles, and guarantee least privilege access for any identity type. Maintain user productivity with seamless sign-in processes, intelligent security features, and centralized administration. Strengthen your organization with an identity and access management solution that links individuals to their applications, devices, and data. Explore, address, and oversee permission risks throughout your multicloud infrastructure using a cloud infrastructure entitlement management (CIEM) solution. Additionally, create, issue, and validate privacy-focused decentralized identity credentials with an identity verification solution, ensuring comprehensive security and user trust. This holistic approach to identity management not only enhances security but also fosters a culture of accountability and transparency within your organization.
  • 13
    Powertech Identity Manager for IBM i Reviews
    Ensuring that users have the appropriate rights while restricting unnecessary access is essential for maintaining the security of IBM i systems. Streamline the process of creating and updating user profiles by utilizing an automated and user-friendly solution. When onboarding new employees or adjusting the roles of current staff, you can generate user profiles tailored to their specific department and job title, eliminating the need to start from the ground up. It is crucial to guarantee that employees who hold the same positions possess uniform authorities, permissions, and access to partitions necessary for their responsibilities. By using templates, you can maintain consistency in user profile configurations throughout the organization. Easily modify profile settings and update profile templates across multiple systems without the need to log into each one individually. Additionally, Powertech Identity Manager for IBM i features a central administration menu that facilitates the creation or modification of user profiles across various systems, enhancing efficiency and security management. This centralized approach not only saves time but also helps ensure compliance with security policies effectively.
  • 14
    WALLIX Trustelem Reviews
    WALLIX Trustelem aims to provide a straightforward and user-friendly approach to administration. With its web-based administration console, IT personnel can effortlessly establish directory synchronization, oversee the life cycles of external user accounts and applications, formulate and modify access rules, monitor activities, and conduct audits on access security. Maintain authority over your identities and sensitive information! The WALLIX Trustelem platform is hosted and managed by a reputable European cloud service provider, ensuring data sovereignty and security which are crucial for delivering quality service while safeguarding your company's assets. Trustelem is crafted for an effortless user experience and administration, applicable in both the development and operational stages. Central to Trustelem's framework, software, and operations is a robust emphasis on security, making it a reliable choice for organizations. The commitment to providing a secure environment not only protects users but also enhances overall trust in the system.
  • 15
    Ory Reviews

    Ory

    Ory

    $29 per month
    The missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple.
  • 16
    Infisign Reviews

    Infisign

    Infisign

    $4/per month
    Infisign's Identity and Access Management platform is a cutting edge IAM platform that revolutionizes the digital security industry by leveraging decentralized identities, passwordless authentication and federation capabilities. The solution allows organizations to streamline authentication, manage access efficiently and ensure compliance in diverse environments. Infisign's unique approach addresses the challenges of traditional IAM and offers a comprehensive modern identity management solution.
  • 17
    walt.id Reviews
    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps. Our wallet infrastructure contains the following products and functionalities: White Label Wallets: Launch identity wallets fast with our open source progressive web app and UI. Embedded wallets: Extend your existing applications with all the identity and crypto capabilities you need. Mobile Wallets: Build a mobile apps (iOS, Android) with our multi-platform libraries and SDKs.
  • 18
    Azure-AD-External-Identities Reviews

    Azure-AD-External-Identities

    Microsoft

    $0.00325 per month
    Azure Active Directory External Identities, a component of Microsoft Entra, facilitates secure digital experiences for a variety of external users, including partners, customers, and citizens, while also offering customization options. This solution allows organizations to integrate external identities and user directories into a single platform, enhancing access management throughout the enterprise. Employees, whether working onsite or remotely, gain uninterrupted access to their applications, enabling them to maintain productivity from any location. The system also streamlines workflows for efficient user lifecycle management and provisioning. By implementing self-service identity management for external users, administrators can significantly reduce their workload and resource expenditure. Furthermore, users can easily access a multitude of pre-integrated software as a service (SaaS) applications through single sign-on capabilities, which can be utilized from any device, anywhere in the world. This comprehensive approach not only enhances security but also fosters collaboration and efficiency across diverse user groups.
  • 19
    NdSecure Reviews

    NdSecure

    Ndende Technologies

    $8/month/user
    NdSecure serves as an effective Single Sign-On (SSO) and Identity and Access Management (IAM) solution. It is designed to deliver a user-centric, adaptable, and customizable approach to identity and access management, suitable for a wide range of industry-specific frameworks. The primary function of NdSecure is to establish a secure and resilient logical access control environment that employs robust authentication techniques. This ultimately aims to thwart unauthorized access to corporate management systems, which helps in mitigating fraud associated with insider threats. Additionally, NdSecure's API management platform enhances workforce capabilities by offering sophisticated methods to regulate access to multiple applications. By taking advantage of pre-existing request content and identity repositories, NdSecure is able to offer a variety of features including: • Authentication driven by policies • Both coarse and fine-grained authorization capabilities • Single sign-on options utilizing SAML, OpenID Connect, social logins, or OAuth-based federation • Compliance with Common Criteria standards • Implementation of FIDO 2.0 and W3C WebAuthn technologies Furthermore, NdSecure's flexible architecture allows organizations to adapt their security measures to evolving threats and compliance requirements, thereby ensuring a comprehensive protection strategy.
  • 20
    Active Roles Reviews
    Streamline your identity management and security by gaining visibility into all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from one comprehensive interface. This approach allows for the implementation of fine-tuned privileged access for users and objects precisely when necessary through dynamic delegation across your identity framework. By automating tedious processes, you can enhance efficiency and security while expediting the management of accounts, groups, and directories. Our Microsoft solution facilitates the centralized management of all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants within a single dashboard. Additionally, it allows for the control of access and permissions through dynamic rules, group families, and automated policies. You can efficiently manage users, groups, roles, contacts, Microsoft 365 licenses, and other objects using customizable scripts and configurable workflows. Furthermore, the integration of Active Roles with AWS Directory Service supports a zero-trust least privilege model, ensuring secure access delegation and synchronized user data from on-premises environments. This comprehensive management system not only simplifies operations but also enhances your overall security posture.
  • 21
    RapidIdentity Reviews

    RapidIdentity

    Identity Automation

    Identity Automation offers a comprehensive solution for identity, access, governance, and administration that is highly scalable throughout its entire lifecycle. Their leading product, RapidIdentity, empowers organizations to boost their business agility while prioritizing security and improving user experience. If your organization aims to enhance security measures, mitigate risks associated with data and network breaches, and lower IT expenditures, adopting RapidIdentity is the ideal choice. By implementing this solution, businesses can also optimize their operational efficiency and achieve a more seamless integration of security protocols.
  • 22
    PracticeProtect Reviews
    You don’t just require a password manager; what you truly need is a dedicated cloud and data security solution specifically designed for accountants. Practice Protect offers a comprehensive suite of features, ranging from compliance assistance to advisory services, along with single sign-on and seamless offboarding options. It's the most trusted platform among accountants around the globe, surpassing all other data and password management tools. With Practice Protect, you can expand your practice confidently, hire skilled professionals, work remotely, and provide support to your teams wherever they are, all while enjoying enhanced login security, email safeguards, and extensive cyber threat training. Everything you need is incorporated into one platform. Boasting over 50 custom-built features and more than 6,000 integrations, accounting firms experience heightened safety and scalability with Practice Protect. This platform offers encryption that is up to 10 times stronger than standard password managers, as well as compliance templates, security training, and limitless support from person to person. Ultimately, Practice Protect stands out as the all-in-one cloud and cybersecurity solution for contemporary accounting firms. Discover why a greater number of accountants globally opt for Practice Protect over any other data security tool available.
  • 23
    Pirean Access: One Reviews
    We offer comprehensive authentication and authorization solutions tailored for both web and mobile environments. Our Access: One platform safeguards valuable data, intellectual property, and equity across essential sectors. Collaborating with some of the largest enterprises globally, we ensure the protection of their services on an international scale. Utilizing our private cloud identity platform, we empower clients to swiftly implement identity services that create a centralized control point for identity and entitlement management. Our offerings include adaptable access management features that support single sign-on alongside strong user authentication. Additionally, we provide a flexible and powerful IAM API that extends the capabilities of your identity infrastructure. We pride ourselves on being recognized for our innovative approaches, versatility, and a consistent focus on enhancing the user experience. Our commitment to excellence helps us stay at the forefront of the industry.
  • 24
    SentryLogin Reviews

    SentryLogin

    Sentry Login

    $4.95 per month
    Since its inception in 2001, Sentry has established itself as the leading Member System for platforms such as Squarespace, Weebly, and WordPress. It offers a straightforward paywall and password protection solution compatible with Weebly, Squarespace, Yola, Blogger, and WordPress, among others. Designed with non-developers in mind, Sentry makes installation a breeze; all necessary code for the login form and protection is supplied, allowing you to simply Copy, Paste, and Publish. The integrated Sentry Integration Wizard not only assists in setting up your subscription plans but also facilitates the entire installation process. Although Sentry is user-friendly, our dedicated support team is always ready to assist, responding promptly to email inquiries for the lifetime of your subscription. With superior support, no other service can match the speed and efficiency we offer. Additionally, our Header/Footer (skin) tools allow you to customize the look of Sentry's forms and pages to align with your website's design, or you can take advantage of our complimentary service to create your own unique branding. Furthermore, this personalized touch ensures that your site remains cohesive and professional.
  • 25
    DirectID  Reviews
    By leveraging Open Finance and bank statement data, DirectID help lenders understand their customers throughout the credit risk lifecycle, from onboarding through to collections & recoveries. DirectID Solutions include: AFFORDABILITY Automated transaction categorisation, instant insights and income verification for any customer with a bank account, all allows for more informed affordability assessments. IDENTITY Perform bank account validation checks to confirm identity, and then go beyond basic checks through our financial insights. ONBOARDING Remove onboarding friction caused by paper documents. Get seamless onboarding, verify asserted income and gather bank transactions with instant analysis in seconds. COLLECTIONS Create more informed collections programmes and better customer experiences with direct data insights. CREDIT RISK Don't rely on aged credit data and self-asserted income. Our real-time data insights supplement credit bureau reports to enable smarter credit risk underwriting. OPERATIONAL EFFICIENCY Reduce time spent on the phones and assessing documents. Connect directly to customer bank data and get automatically categorised transactions in seconds, whilst also reducing fraud.