Access Management Reviews and Ratings
What is Access Management?
Gartner defines access management (AM) as tools that include authentication and single sign-on (SSO) capabilities, and that establish, manage and enforce runtime access controls for modern standards-based and classic web applications and APIs.
AM’s purpose is to enable SSO access for people (employees, consumers and other users) and machines to protected applications in a streamlined and consistent way that enhances the user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.
Product Listings
Filter by
Okta is an independent identity provider that focuses primarily on securely connecting individuals to suitable technology. Utilizing the Okta Identity Cloud, the firm eases the secure access to applications and infrastructure providers with its extensive range of pre-built integrations. Satisfying the needs of a variety of organizations, Okta leverages its solutions to safeguard the identities of workforce and customers, helping them attain their potential without fearing identity-related threats. The company operates on the idea that confident individuals and organizations can unlock their full potential when their identities are well-protected.
Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.
Microsoft Security helps protect people and data against cyberthreats to give peace of mind.
Ping Identity is a company centered on enhancing the safety and efficiency of digital experiences. The principal business issue it addresses is the challenge of maintaining high-security standards while simultaneously ensuring smooth interactions for users. It enables enterprises to integrate top-tier identity solutions with existing third-party services. The main objective is eliminating passwords, curtailing fraud, supporting Zero Trust, among other security measures. Ease of operation is a primary focus, with a drag-and-drop canvas serving as the chief mechanism for achieving these goals. Offices span multiple global locations with the head office situated in Denver, Colorado.
One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide.
Okta is an independent identity provider that focuses primarily on securely connecting individuals to suitable technology. Utilizing the Okta Identity Cloud, the firm eases the secure access to applications and infrastructure providers with its extensive range of pre-built integrations. Satisfying the needs of a variety of organizations, Okta leverages its solutions to safeguard the identities of workforce and customers, helping them attain their potential without fearing identity-related threats. The company operates on the idea that confident individuals and organizations can unlock their full potential when their identities are well-protected.
Thales is a worldwide entity focusing on digital security. The company's main objective is to provide trust in an ever-increasing digitally interconnected society. To achieve this, Thales has developed a variety of products, software, and services that hinge on two foundational technologies: digital identification and data security. These technologies play a crucial role in various aspects of contemporary life such as payment methods, enterprise security, and the internet of things. The purpose of the technology is to assist in delivering digital services securely for a multitude of individuals and things.
Oracle is a cloud technology company that offers computing infrastructure and software solutions globally. This organization has developed an autonomous database, the first of its kind, to help manage and secure data. Oracle Cloud Infrastructure presents functionalities to facilitate the transition of workloads from on-site systems to the cloud, and vice versa, as well as between different clouds. Oracle's cloud software applications provide modern tools designed to support sustainable growth and resilience in businesses. Tools developed by Oracle are used by a wide range of users including nonprofit organizations and businesses of various sizes, to aid in operations like supply chain streamlining, human resource management, financial planning and connecting data and global users. Apart from business solutions, Oracle's technology also aids in tasks ranging from government defense to scientific and medical research.
Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
RSA is a company that offers comprehensive solutions for better digital security. Instead of focusing on traditional security methods, RSA takes an identity-first approach. This enables organizations to cope with the fast-paced digital world reinventing their security measures. The solutions include modern authentication systems, lifecycle management services, and a robust identity governance framework. The company can adapt its services across different platforms such as cloud-based, on-premises, or a combination of both, known as hybrid.
Amazon Web Services (AWS), established in 2006, is focused on providing essential infrastructure services to businesses globally in the form of cloud computing. The key advantage offered through cloud computing, particularly via AWS, is its capacity to shift fixed infrastructure expenses into flexible costs. Businesses have been able to forgo extensive planning and procurement of servers and other Information Technology (IT) resources, owing to AWS. AWS seeks to provide businesses with prompt and cost-effective access to resources using Amazon's expertise and economies of scale, as and when their business requires. Currently, AWS offers a robust, scalable, economic infrastructure platform on the cloud powering an extensive array of businesses worldwide. It operates across numerous industries with data center locations in various parts of the globe including U.S., Europe, Singapore, and Japan.
SecureAuth is a company specializing in next-generation access management and authentication, offering a secure, passwordless and continuous authentication experience. The company's solution is unique in its ability to be deployed in various environments including cloud, hybrid, and on-premises. SecureAuth handles and safeguards access to applications, systems, and data on a large scale, functioning globally.
miniOrange is a cybersecurity-first firm, based out of the United States and India. With a wide reach in IAM, miniOrange specializes in Single Sign On, Multi Factor Authentication, Adaptive Risk Based Authentication, User Provisioning and Lifecycle Management, etc. miniOrange caters to a wide set of industries ranging from Government, Education and Non-profit to Manufacturing, Healthcare and Retail. Currently serving 16000+ active user organizations, miniOrange is blitzscaling its presence in the Access Management space.
Founded in 2005, WSO2 is an independent software vendor providing open-source API management, integration, and identity and access management (IAM) products. WSO2's products and platforms, including our internal developer platform, Choreo, enable organizations to leverage the full potential of APIs for secure delivery of digital services and applications, supporting thousands of enterprises in over 90 countries globally to drive their digital transformation efforts. Our open-source, API-first approach frees developers and architects from vendor lock-in, enabling rapid digital product creation. WSO2 operates globally, with offices in Australia, Brazil, Germany, India, Sri Lanka, the UAE, the UK, and the US.
IBM is a well-established entity focused on technology and development. The primary mission revolves around fostering technological growth and enhancing infrastructure, achieved through focused developments and consulting services. By encouraging inventiveness and innovation, it is geared towards facilitating the transition of theoretical ideas into practical realities, thus improving global functionalities. IBM brings about transformation by creating advanced solutions that reshape and redefine the world.
OpenText powers and protects information to elevate every person and every organization to gain the information advantage. As a global Information Management company, OpenText offers a portfolio of solutions across content, business network, digital experience, security, application modernization, operations management and developer APIs. OpenText solutions help customers simplify their systems, connect their data, build frictionless automation and thrive in a multi-cloud world. The company fosters inclusive environments that leverage the diverse backgrounds and perspectives of all employees, customers, suppliers and partners.
Oracle is a cloud technology company that offers computing infrastructure and software solutions globally. This organization has developed an autonomous database, the first of its kind, to help manage and secure data. Oracle Cloud Infrastructure presents functionalities to facilitate the transition of workloads from on-site systems to the cloud, and vice versa, as well as between different clouds. Oracle's cloud software applications provide modern tools designed to support sustainable growth and resilience in businesses. Tools developed by Oracle are used by a wide range of users including nonprofit organizations and businesses of various sizes, to aid in operations like supply chain streamlining, human resource management, financial planning and connecting data and global users. Apart from business solutions, Oracle's technology also aids in tasks ranging from government defense to scientific and medical research.
Okta is an independent identity provider that focuses primarily on securely connecting individuals to suitable technology. Utilizing the Okta Identity Cloud, the firm eases the secure access to applications and infrastructure providers with its extensive range of pre-built integrations. Satisfying the needs of a variety of organizations, Okta leverages its solutions to safeguard the identities of workforce and customers, helping them attain their potential without fearing identity-related threats. The company operates on the idea that confident individuals and organizations can unlock their full potential when their identities are well-protected.
Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.
Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Features of Access Management
Mandatory Features:
A directory or identity repository for all constituencies, including identity synchronization services.
Authorization policy definition and enforcement for any resources directly defined in the system such as applications and APIs (including support for OAuth 2.0).
Adaptive access capability based on dynamic evaluation of identity trust and access risk.
SSO and session management, with support for standard identity protocols (e.g., OpenID Connect, OAuth 2.0., SAML) for accessing standards-based and legacy apps (via proxies or agents).
User authentication, including: 1. Support for phishing-resistant multifactor authentication (MFA) methods (e.g., X.509, FIDO). 2. Controls to mitigate usage of compromised passwords. 3. Protections against common MFA attacks directly or via out-of-the-box integration with third-party authentication services. 4. Support for any type of passwordless authentication methods.
Basic identity life cycle management, including support for enabling create, read, update and delete (CRUD) operations for all user types.