Customer identity and access management (CIAM) software helps create consumer identity accounts and directories. These accounts can be added, altered, or deleted, allowing the business to control the information a customer can access. CIAM tools are used to strengthen both customer privacy and business data security. If a vendor supplies multiple products, these tools can also improve the customer experience by creating simplified access across multiple channels.
There is some crossover between CIAM solutions and privileged access management (PAM) solutions. While CIAM solutions facilitate the creation and modification of customer or consumer identities, PAM offerings are more geared toward internal employee permissions and business-to-business relations. They help create accounts to give internal users access to applications, networks, and sensitive information.
To qualify for inclusion in the Customer Identity and Access Management category, a product must:
Customer Identity and Access Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.
Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
Centrify Application Services improves end-user productivity and secures every user’s access to apps. IT teams that leverage Centrify's Application Services are able to support internal users (employees, contractors) and external users (partners, customers), wherever they are. Components of Centrify Application Services: Single Sign-On – One-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. Adaptive MFA for App Access – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Workflow & Lifecycle Management – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management – Manage devices, secure native mobile apps and provide context for smarter access decisions. App Gateway – Provide your IT administration teams with secure, granular access to infrastructure regardless of location and without the hassles of a VPN. More about Centrify: Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by top tier investors including Accel Partners, Mayfield, Sigma West, Index Ventures, Samsung Ventures, NTT Docomo and Fortinet.
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others. With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.
OneLogin simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.
Signal is the first and only Customer Identity Solution for the enterprise. Signal’s platform transforms the customer experience by providing contextual relevance at all points of engagement, regardless of place or time. Today, Signal’s technology runs on more than 45,000 digital properties in 158 countries. The platform facilitates billions of data requests monthly, supporting top brands around the world that generate more than $1.5 trillion in commerce, including Allstate, Audi, Crate & Barrel, JetBlue Airways, Starcom MediaVest Group, Starwood Hotels and Resorts, and many more. Signal has been recognized with numerous awards and honors, appearing on the Inc. 500 list of the fastest growing companies in 2015, 2016 and 2017.
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management.
So much more than SSO – Cloud Identity Service is a complete Identity and Access Management as a Service (IDaaS). Onboard SaaS apps 100x faster Cloud Identity Service has onboarded SaaS applications 100x faster than legacy on premises IAM environments and can integrate nearly any number and type of identity repositories in 5 easy steps. Reduce IAM costs by up to 60% Eliminate on-premise hardware and software deployment costs, as well as upgrade and maintenance expenses. Cut deployment time up to 75% Without requiring clients to hire and train specialized IAM staff, Cloud Identity Service is deployed up to 75% faster than off-the-shelf identity and access management systems.
Janrain makes it easy to know your customers and personalize every interaction. Our Customer Identity Management Platform helps companies build a unified view of their customers across all devices by collecting accurate customer profile data to power personalized marketing. The platform encompasses social login, registration, customer profile data storage, customer insights, single sign-on, and engagement. Janrain powers customer identity management for brands like Pfizer, AMC, Samsung, Whole Foods, Fox News, Philips, Marvel, Mattel and Dr. Pepper.
One username. One password. Zero headaches. The PingOne® cloud is an identity-as-a-service (IDaaS) solution that enables organizations to deliver secure cloud single sign-on (SSO) and multi-factor authentication for users with just one username and password—eliminating the multiple password security problem. Recognized by Gartner®, Forrester®, IDC and KuppingerCole, the PingOne cloud delivers one-click access to all of the SaaS, legacy and custom web applications your users need while increasing security for your organization. Get more info: https://www.pingidentity.com/en/products/pingone.html
Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.
The Drawbridge Identity Graph transforms customer data into a powerful competitive advantage. Advanced machine learning on 100 billion edges gives you the ability to perform advanced queries and construct identities with higher fidelity than ever. Our industry-leading technology sets our graph apart and empowers you to see people as people, not just a set of links. Unmatched scale and coverage: We offer the industry’s highest coverage of consumers and connected devices, extending across 80% of the world’s internet users. If your customers live on Earth, chances are we can help. Industry-leading precision: Drawbridge Identity Graph predicts matches with up to 97.3% precision, validated by Nielsen and others as the most precise technology-driven solution ever tested—and we do it at scale.
ForgeRock provides an identity platform to helps global brands, enterprises and government entities build secure, customer-facing relationships across any app, device or thing, user can use online identities to grow revenue, extend reach and launch new business models, and the company.
With Omada Customer Identity and Access Management (CIAM) you’re able to manage external identities with the same level of security and access governance as for your internal identities. With a web-based portal for self-registration you can encourage your customers and external partners to engage with your company while ensuring data privacy and security. Combining Omada identity and access management with CIAM ensures maximum return on investment as CIAM utilizes the powerful Omada Identity Suite with its components, advance business flows, and governance features.
Rippling makes it easy to manage your employee's payroll, benefits, HR and even IT — from their computers to their software — all in one, online platform. Hiring someone, for example? Through Rippling, you can: invite your new hire to e-sign their agreements, add them to payroll and benefits, order and configure their computer, and create their user account in over 300 apps — like Gmail, MS Office, Slack, Salesforce, and Dropbox. All in just a few clicks.
Lieberman RED – Rapid Enterprise Defense Identity Management, formerly known as Enterprise Random Password Manager, is a Proactive Cyber Defense Platform. It protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks – on-premises, in the cloud and in hybrid environments. RED Identity Management simplifies the management of your privileged credentials, delivering automated protection at scale, with a rapidly deployed and affordable solution. RED Identity Management continuously discovers and tracks privileged accounts on your cross-platform network, and automatically provides each account with unique and frequently changing credentials. It ensures that powerful privileged identities are only available to audited users on a temporary, delegated basis – preventing unauthorized and anonymous access to systems with sensitive data.
Cidaas uses local data hubs to ensure the highest security standards: primarily with secure interface authentication through OAuth2 protocol and OpenID Connect and, above all through, multi-factor authentication, the unambiguous verification of user identities and fraud detection based on BigData Technolgy.
The IAM Cloud platform sits at the heart of an organisation's IT infrastructure. Once connected, it flows data between systems, and uses intelligent identity management to automate processes such as user creation and provisioning, security configuration and login control, and a range of advanced IT features like Single Sign On, password resets, MFA, and admin-to-user communications.
Our innovative, cloud-based identity and access management (IAM) solutions provide additional layers of security when accessing crucial web applications and sensitive data.
The LoginRadius Consumer Identity Platform is a unified, SaaS-based platform that enables organizations to offer easy and convenient access to their online properties. Whether it's an industry standard registration or social login, LoginRadius offers multiple options to help engage and grow your customer base.
Passport is a secure and flexible customer identity and access management (CIAM) solution designed to seemlessly scale from development phase to managing millions of users quickly and easily. We provide single-tenant on-premise or private-cloud hosting, single sign-on (SSO), multi-factor authentication (MFA), data search and segmentation, region localization, and more, all with a powerful API designed for quick integration with a variety of systems. We also provide comprehensive enterprise identity unification (EIU) to serve growing companies that are combining multiple sites and services into a parent enterprise.
The Ubisecure Identity Platform solves today's identity management issues and is built to scale for future business requirements for digital transformation, omni-channel services, IoT, big data, and more. Our product centric approach is designed to dramatically reduce Identity & Access Management (IAM) deployment and operating costs, and maximise your upsell and cross-sell revenue, and incorporates both the on-premise Identity Server and the managed Identity Cloud service.
Anomalix Identity as a Service is a cloud-based managed service that provides a cost effective alternative to in-house Identity and Access Management (IAM) operations and administration. Anomalix's IDaaS solution eliminates hardware, software and human capital costs from the security equation. The value proposition is a lower total cost of ownership, faster time to market and increased flexibility to focus on business initiatives instead of operational and administrative overhead.
The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement
Evident is revolutionizing the way personal data is shared. Our Identity Assurance Platform enables businesses of all sizes to run comprehensive, accurate, up to date verifications without handling sensitive personal information. From identity verifications to background checks and everything in between, businesses of all sizes can get the answers they need with less risk and friction.
Intercede makes identifying and managing digital credentials easy with their products MyID, MyTAM, and RapID. In a world filled with new cybersecurity issues springing up every day, these cloud-based applications enable users to securely monitor and manage digital identities.
CloudID is a highly modular, SOA-based software platform that delivers an unsurpassed ability to rapidly develop and deploy highly secure, yet flexible standards-based identity solutions. It continuously adapts to evolving customer requirements and emerging market demands. It truly delivers on the promise of Future Proof Identity.
MidPoint Identity and Access Management System is an open-source identity-management system that provides companies with what they need to unify and synchronize user accounts. Through the intuitive interface, you can group users together, establish roles, and automate the process of adding and removing new identities into the system. Ultimately, this works towards saving time, money, and effort regarding identities and user accounts that need to be created for your company.
REACH is an award-winning enterprise-class remote transaction platform that reinvents the digital customer experience. REACH's proprietary technology bridges the gap between businesses and their customers in the digital world. We help businesses connect with their remote customers in real-time, efficiently, conveniently and securely, without losing the human touch. Our solution enables businesses to verify their customers' identity, communicate and collaborate, simplify documentation signing and streamline sales and complex transactional procedures. A brief video of REACH in action can be seen here: http://bit.ly/Reach_The_Video REACH’s platform is being used by over 100 Enterprises and SMBs from various industries and verticals, including many Fortune 500 companies. The results are higher conversion rates, faster processes, reduced legal risk and an overall boost in user experience.
Building on top of SecZetta's NE Profile and NE Access suite of products is a robust solution to the challenges of creating and managing customer identities to achieve a seamless customer experience. Customers interact with brands several ways, social, mobile, in-store and online. In fact, sometimes they expect to be able to interact with a brand across multiple channels at the same time.
Simeio Identity-as-a-Service (IDaaS) is a software that provides a simple and low-cost alternative to building and maintaining own IAM infrastructure, it eliminates the hardware costs, in many cases the software licenses, plus the ongoing maintenance and upgrade costs required to deploy and maintain an IAM infrastructure.