Customer identity and access management (CIAM) software helps create consumer identity accounts and directories. These accounts can be added, altered, or deleted, allowing the business to control the information a customer can access. CIAM tools are used to strengthen both customer privacy and business data security. If a vendor supplies multiple products, these tools can also improve the customer experience by creating simplified access across multiple channels.
There is some crossover between CIAM solutions and privileged access management (PAM) solutions. While CIAM solutions facilitate the creation and modification of customer or consumer identities, PAM offerings are more geared toward internal employee permissions and business-to-business relations. They help create accounts to give internal users access to applications, networks, and sensitive information.
To qualify for inclusion in the Customer Identity and Access Management category, a product must:
Customer Identity and Access Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.
Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
OneLogin simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.
Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others. With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management.
So much more than SSO – Cloud Identity Service is a complete Identity and Access Management as a Service (IDaaS). Onboard SaaS apps 100x faster Cloud Identity Service has onboarded SaaS applications 100x faster than legacy on premises IAM environments and can integrate nearly any number and type of identity repositories in 5 easy steps. Reduce IAM costs by up to 60% Eliminate on-premise hardware and software deployment costs, as well as upgrade and maintenance expenses. Cut deployment time up to 75% Without requiring clients to hire and train specialized IAM staff, Cloud Identity Service is deployed up to 75% faster than off-the-shelf identity and access management systems.
Lieberman RED – Rapid Enterprise Defense Identity Management, formerly known as Enterprise Random Password Manager, is a Proactive Cyber Defense Platform. It protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks – on-premises, in the cloud and in hybrid environments. RED Identity Management simplifies the management of your privileged credentials, delivering automated protection at scale, with a rapidly deployed and affordable solution. RED Identity Management continuously discovers and tracks privileged accounts on your cross-platform network, and automatically provides each account with unique and frequently changing credentials. It ensures that powerful privileged identities are only available to audited users on a temporary, delegated basis – preventing unauthorized and anonymous access to systems with sensitive data.
Janrain makes it easy to know your customers and personalize every interaction. Our Customer Identity Management Platform helps companies build a unified view of their customers across all devices by collecting accurate customer profile data to power personalized marketing. The platform encompasses social login, registration, customer profile data storage, customer insights, single sign-on, and engagement. Janrain powers customer identity management for brands like Pfizer, AMC, Samsung, Whole Foods, Fox News, Philips, Marvel, Mattel and Dr. Pepper.
Silverfort delivers strong authentication and adaptive Multi-Factor Authentication (MFA) across corporate systems including on-premise, cloud and hybrid environments, from a unified platform, without deploying any software agents or gateways and without modifications to endpoint or servers.
One username. One password. Zero headaches. The PingOne® cloud is an identity-as-a-service (IDaaS) solution that enables organizations to deliver secure cloud single sign-on (SSO) and multi-factor authentication for users with just one username and password—eliminating the multiple password security problem. Recognized by Gartner®, Forrester®, IDC and KuppingerCole, the PingOne cloud delivers one-click access to all of the SaaS, legacy and custom web applications your users need while increasing security for your organization. Get more info: https://www.pingidentity.com/en/products/pingone.html
Only Avatier delivers a private instance cloud independent or on-premise Identity Management platform in just minutes using secure and scalable Docker containers. This enables organizations to scale faster, innovate quicker, conquer and embrace change, to dominate their competition. Avatier brings all back-office business applications and employee assets together and manages them as one. Our Identity solutions are delivered and managed using the latest Docker container technology providing maximum flexibility, scale, compliance, and security to our customers.
Rippling is the world's first way to manage your company's HR & IT — from your team's payroll and health insurance, to their computers and cloud apps — all in one, integrated system. Want to hire someone, for example? Just click a button, and Rippling can instantly: add new hires to your payroll and benefits, create their email, ship their work computer, and even create their user account across all your cloud apps, like Gmail, Slack, and Microsoft Office.
The Drawbridge Identity Graph transforms customer data into a powerful competitive advantage. Advanced machine learning on 100 billion edges gives you the ability to perform advanced queries and construct identities with higher fidelity than ever. Our industry-leading technology sets our graph apart and empowers you to see people as people, not just a set of links. Unmatched scale and coverage: We offer the industry’s highest coverage of consumers and connected devices, extending across 80% of the world’s internet users. If your customers live on Earth, chances are we can help. Industry-leading precision: Drawbridge Identity Graph predicts matches with up to 97.3% precision, validated by Nielsen and others as the most precise technology-driven solution ever tested—and we do it at scale.
ForgeRock provides an identity platform to helps global brands, enterprises and government entities build secure, customer-facing relationships across any app, device or thing, user can use online identities to grow revenue, extend reach and launch new business models, and the company.
With Omada Customer Identity and Access Management (CIAM) you’re able to manage external identities with the same level of security and access governance as for your internal identities. With a web-based portal for self-registration you can encourage your customers and external partners to engage with your company while ensuring data privacy and security. Combining Omada identity and access management with CIAM ensures maximum return on investment as CIAM utilizes the powerful Omada Identity Suite with its components, advance business flows, and governance features.
Cidaas uses local data hubs to ensure the highest security standards: primarily with secure interface authentication through OAuth2 protocol and OpenID Connect and, above all through, multi-factor authentication, the unambiguous verification of user identities and fraud detection based on BigData Technolgy.
Evident is revolutionizing the way personal data is shared. Our Identity Assurance Platform enables businesses of all sizes to run comprehensive, accurate, up-to-date verifications without handling sensitive personal information. From identity verifications to background checks and everything in between, businesses of all sizes can get the answers they need with less risk and friction.
The IAM Cloud platform sits at the heart of an organisation's IT infrastructure. Once connected, it flows data between systems, and uses intelligent identity management to automate processes such as user creation and provisioning, security configuration and login control, and a range of advanced IT features like Single Sign On, password resets, MFA, and admin-to-user communications.
LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. Improve Customer Engagement with Seamless Registration and Authentication: Remove barriers to customer acquisition and conversion across all digital properties. Options include standard username and password, phone registration, and passwordless login. Secure Customer Identities and Build Trust: Create a verification process that provides an extra layer of security. Multi-factor authentication and risk-based authentication are quick and easy to set up. Meet all major regional regulations and policies with LoginRadius Cloud Storage, deployed over 29 data centers worldwide. Leverage Identity for Growth: A LoginRadius implementation can be up and running within a few weeks, giving an instant return on investment by saving months of time and significant resources. Cut engineering costs by up to 95% with a ready-to-deploy CIAM solution that addresses all customer identity needs in one platform. Get a Deep Understanding of Customers with Unified Profiles: Deploy a single customer identity to track and recognize customers at each touchpoint in their journey. Progressively gain a better understanding of how they interact with your brand so you can personalize the digital experience.
The Ubisecure Identity Platform solves today's identity management issues and is built to scale for future business requirements for digital transformation, omni-channel services, IoT, big data, and more. Our product centric approach is designed to dramatically reduce Identity & Access Management (IAM) deployment and operating costs, and maximise your upsell and cross-sell revenue, and incorporates both the on-premise Identity Server and the managed Identity Cloud service.
Anomalix Identity as a Service is a cloud-based managed service that provides a cost effective alternative to in-house Identity and Access Management (IAM) operations and administration. Anomalix's IDaaS solution eliminates hardware, software and human capital costs from the security equation. The value proposition is a lower total cost of ownership, faster time to market and increased flexibility to focus on business initiatives instead of operational and administrative overhead.
The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement
Centrify is redefining the legacy approach to Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases. As traditional network perimeters dissolve, organizations must discard the old model of “trust but verify” which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Organizations may consider approaching Privileged Access Management by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions. Centrify’s industry-recognized solution redefines legacy Privileged Access Management and goes beyond simple password vaulting to converge the core tenets of Zero Trust Privilege. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse. Organizations turn to Centrify Zero Trust Privilege to … • Secure access • Stop breaches • Empower business operations • Increase business confidence • Secure the vote! Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by leading private equity investment firm Thoma Bravo.
Datacard Secura identity & credential management software revolutionizes the issuance and post-issuance management of highly secure passports, national IDs, PIV cards and other secure government credentials. It streamlines every step of the process, including enrollment, identity verification, application approval, document issuance and post issuance management.
Entrust Datacard TruCredential software suite is a solution for creating, issuing and managing secure ID cards and credentials. The software allows organizations to meet a wide range of application requirements, from basic photo ID cards to high-assurance credentials.
HelloID is a modern and secure cloud-based Identity & Access Management (IAM) solution. With one powerful cloud solution, you have an answer to the increasingly complex Identity Management issues within your organization. Responding to stricter audits The internal IT has become a driving factor for organizations as it contributes more and more to their success. Tackling the transition from on-premise to cloud forms a challenge. Ever-more-demanding regulations and legislation covering auditing and security exacerbate the pressure already felt by your IT department. ... with less effort With HelloID, Tools4ever offers a 100% cloud-based Identity Management solution that assists your organization in improving efficiency and responding to compliance requirements. HelloID provides your employees a modern, secure and cloud-based desktop for all of their IT applications. ... with a low investment Thanks to the rapid implementation and availability in the cloud, you can take a large leap forward with your organization’s Identity Management – all with considerably low investment and minimal management costs. Access Management HelloID Access Management offers employees, partners and even customers uniform and straightforward access to your cloud applications via a single portal. Authentication takes place via a single login with username and password. If desired, two-factor authentication can be used for extra verification. Open Cloud Applications with a single mouse click The user gains access to a user-friendly dashboard on the laptop, tablet or smartphone. Only log in once per session HelloID supports all common Single Sign-On (SSO) protocols to automatically identify and authenticate users per each cloud application. Two-factor authentication For extra security, a pin code can be required via Google Authentication and/or via another device. “Catch-All” for any app Applications that are not standardized for SSO can easily be integrated into HelloID via a 'catch all' option. Service Automation HelloID introduces Service Automation for your IT-department. Users can request access to applications or data via their dashboard in the online portal. Their manager can approve this request with one single click, after which the change is processed and logged automatically in the IT infrastructure. Simple management With HelloID you can easily publish and manage your internal IT product catalog. Users have access to the catalog via an attractive and user-friendly portal. Insight for managers Via HelloID, the manager keeps track of which employees are active and which licenses, applications, shares, etc. they have in use. Reduce the workload for your helpdesk Requests are no longer all directed towards the helpdesk with HelloID’s self-service and request/approval processes. This dramatically reduces their workload by removing those menial tasks, which also carry compliance and efficiency risks if the helpdesk lacks the proper insight regarding how they relate to the user’s business-role. Instead, changes are handled and registered uniformly, contributing to a professional and modern look for your IT department and company. Automatically up-to-date Automated configuration rules ensure that the product catalog automatically stays up-to-date. For example, a new share is immediately visible in the catalog. Data Management HelloID Data Management modernizes and streamlines access control to your business-critical data. Thanks to HelloID, complicated and error-prone management procedures in the file system and the Active Directory are a thing of the past. Self-management Everyone – from a product manager to an assistant – can manage the access to (sub) folders autonomously as a data owner, without helpdesk intervention. Data owners A data owner can create groups, automatically assign members of the right groups, create folders or add Access Control Lists (ACLs) to a folder. Relief for your IT-department With HelloID, the entire data management can now be implemented without burdening the IT department. Employee Self-service Employees can also directly request access from the data owner.
Access governance (IGA) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with end users who have unnecessary access privileges. The need for access governance has grown in significance as organizations seek to meet regulatory compliance mandates and manage risk in a more a strategic manner.