Identity management software helps organizations securely manage user identities and control access to critical resources. These solutions automate key processes such as user authentication, authorization, and provisioning, improving both security and operational efficiency. Features like password management and access control ensure that only authorized individuals can access sensitive systems and data. These services offer centralized tools for managing user identities across multiple platforms, allowing for seamless integration with existing IT infrastructure. Key functionalities such as multi-factor authentication (MFA), single sign-on (SSO), and role-based access control (RBAC) help organizations meet compliance requirements and minimize the risk of unauthorized access or data breaches. By implementing identity management solutions, businesses can strengthen their security posture, simplify access management, and ensure users are granted the appropriate access levels to perform their roles effectively.
Submit New App
Footprint
onefootprint.com
Footprint unifies onboarding, identity verification, and data security. Onboard your customers without worrying about storing their sensitive data afterwards.
MojoAuth
mojoauth.com
MojoAuth is a passwordless authentication solution that enables your users to take a modern approach to verify their identities without passwords, which in turn provides stronger security and reduces the security risk associated with passwords. MojoAuth provides the easiest & safest atmosphere to add passwordless login to your apps or websites and eliminate the need to generate a password to gain access to the accounts and reduce the friction caused by passwords, hence increased conversions and great customer experience.
Pomerium
pomerium.com
Pomerium is a zero-trust reverse proxy that helps enterprises manage secure application access. --- Authenticate, authorize, monitor, and secure user access to any application without a VPN. Access driven by identity and context. ---- Use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application with Pomerium. Add access control to any app. --- Pomerium provides a standardized interface to add access control whether an application itself has authorization or authentication baked-in. Let developers focus on their apps, not reinventing access control.
Sift
sift.com
Sift is the AI-powered fraud platform securing digital trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per year, and a commitment to long-term customer success empower more than 700 customers to grow fearlessly. Brands including DoorDash, Yelp, and Poshmark rely on Sift to unlock growth and deliver seamless consumer experiences. Visit us at sift.com.
Heimdal
heimdalsecurity.com
Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.
Opal Security
opal.dev
Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).
BetterCloud
bettercloud.com
BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment. By streamlining and automating critical work like user lifecycle processes and day-to-day operations, BetterCloud's thousands of customers enjoy greater operational efficiency and employee productivity. With 10+ years experience pioneering the SaaS Operations movement, BetterCloud now serves the world’s largest community of SaaSOps experts. As host of Altitude, the industry’s leading SaaSOps event, and publisher of the annual State of SaaSOps Report, the category’s definitive market research, BetterCloud is recognized by customers (G2) and leading analyst firms (Gartner and Forrester) as the market leader in SaaS Operations Management. For IT teams that manage multi-SaaS environments, BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies. Unlike Identity & Access Management solutions that require manual intervention and custom scripting, or IT Service Desk solutions that generate tickets to be manually worked, BetterCloud’s granular, powerful automation and unlimited customizable workflows complement your IAM and help desk automation to improve IT efficiency by reducing up to 78% of SaaS management work. If your IT team is scripting or manually managing access to applications, files, folders, and groups for anyone joining, leaving, or moving inside your organization, you’re throwing talent and resources you can't spare at problems BetterCloud can automate. Headquartered in New York City, with a product and engineering office in Atlanta, GA as well as innovation hubs & remote talent across the U.S., BetterCloud is backed, among others, by some of the best technology investors including Vista Equity Partners, Warburg Pincus, Bain Capital, and Accel.
DoControl
docontrol.io
DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution uncovers all SaaS users, 3rd party collaborators, assets/metadata, OAuth apps, groups, and activity events. From there, security teams can create granular data access control policies to reduce the risk of data overexposure and exfiltration. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data loss prevention (DLP) in SaaS. DoControl has no agents, no inline redirections, and no slow response times as commonly found in Cloud Access Security Broker (CASB) solutions.
Zscaler
zscaler.com
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the world’s largest cloud security platform, protecting thousands of enterprises and government agencies from cyberattacks and data loss.
Userfront
userfront.com
Userfront is an auth and identity platform that transforms your business to serve free, freemium, and enterprise customers in one place. New customers are impatient — Userfront specializes in efficiently migrating systems so you can win new business while delighting existing customers.
Kinde
kinde.com
Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers – in one place. Every aspect of Kinde is designed to help your business grow and scale. We went to great lengths to make sure that you don’t have to worry about anything. From startup to IPO in a single platform. Authentication Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Our powerful builder allows you to make sure that your pages are on brand and as beautiful as the rest of your website and product experience. Up-level your security with multi-factor authentication (MFA). Give your users access to advanced authentication options, protecting them from reused or breached passwords. Take control of user authorization and access with enterprise SSO and custom SAML so that you can support your biggest customers as quickly as possible. Manage users from one beautiful dashboard. Add and invite users, manage roles and permissions, and get a complete picture of your user activity. We’ll keep you and your users safe. Kinde is built from the ground up using best-in-class security protocols. Access Control and Multi-tenancy Complex businesses need software that reflects their structure and restricts data access to only the people who should see it. That’s why we’ve included outrageously powerful controls to help you manage your businesses, teams, and users in the most frictionless way possible. Controlling who can access which individual pieces of data and interface is critical to protecting your business and your customers. Hierarchical role-based access control (RBAC) is the best way to manage this. Allowing strict control and flexible assignment – aligning everything from your business view of the world right down to the code you ship to customers. Feature flags Deliver new experiences and increase the speed that your team deploys, learns and releases with feature-based continuous deployment. Shipping to production introduces a degree of risk. Continuous deployment helps to reduce risk and accelerate learning by empowering the team to deploy when ready and separating releasing from shipping. Feature flags are the heart of what makes this work. Mistakes happen. Rollouts are no exception. The important thing is how your team deals with problems, and what tools they have at their disposal to manage problems. Feature flags are a powerful tool for preventing and managing failed change. Billing Coming in Q3, 2024.
Memberstack
memberstack.io
Add secure user authentication and accept payments on any website. Build a custom SaaS application, sell an online digital service, offer a premium member community, an exclusive blog, and more.
WatchGuard
watchguard.com
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMBs and distributed enterprise organizations, our award-winning Unified Threat Management (UTM) appliances are designed from the ground up to focus on ease of deployment, use, and ongoing management, in addition to providing the strongest security possible.
Clerk
clerk.dev
More than authentication. Complete User Management. Clerk is more than a “sign-in box”. Integrate complete user management UIs and APIs, purpose-built for React, Next.js, and the Modern Web.
VeriDoc Sign
veridocsign.com
VeriDoc Sign is the solution to all your problems when it comes to documents and electronic signature verification. VeriDoc Sign uses patented verification technology, developed over the years by VeriDoc Global. It provides blockchain-secured electronic signature solutions to organizations across the globe. VeriDoc Sign offers electronic signature and document solutions to some of the leading companies in both the public and private sectors. Our blockchain verification technology is patented in over 90 countries globally, assisting organizations with the best e-signature solution within reasonable pricing. We thrive to provide the best services to our clients which includes, Organizations can save valuable time by eliminating unnecessary waiting hours. With VeriDoc Sign, your organization will have improved efficiency and greater productivity. The benefits of VeriDoc e-signature solutions allow unending users to have access to verify important documents and send them to the required people. You can’t go wrong with VeriDoc Sign’s tools that provide you with the advantage to verify timestamps and hashes for electronically signed documents on the blockchain. Just scan a QR code with your mobile and you can see the original document on the verification page. Other features of VeriDoc Sign that you just can’t miss: Access control Legally Admissible Tamper-proof blockchain security Affordable
Ondato
ondato.com
Ondato is a tech company that streamlines KYC and AML-related processes using cutting-edge AI solutions tools that cover the full spectrum of compliance challenges, from new client onboarding to a comprehensive database for ongoing client monitoring.
PropelAuth
propelauth.com
PropelAuth is the best solution for B2B authentication and user management. Whether you're selling to small startups, SMBs or large enterprises, you'll always be ready with PropelAuth.
Socure
socure.com
Socure’s patented machine learning platform powers an elevated standard for seamless CIP/KYC compliance, fraud detection, ID document verification, and bank account ownership validation through a purpose-built, end-to-end solutions suite that results in robust, industry-leading accuracy to unlock identity trust for digital interactions and engagement at onboarding and throughout the customer journey.
Signicat
signicat.com
Signicat is a pioneering, pan-European digital identity company with an unrivaled track record in the world’s most advanced digital identity markets. Its Digital Identity Platform incorporates the most extensive suite of identity-proofing and authentication systems in the world, all accessible through a single integration point. The platform supports the full identity journey, from recognition and onboarding, through login and consent, to making business agreements which stand the test of time. Signicat was founded in 2006 and acquired by leading European private equity investor Nordic Capital in 2019. It is headquartered in Trondheim, Norway. For further information about Signicat, please visit www.signicat.com
SuperTokens
supertokens.com
SuperTokens is an open source user authentication solution backed by Y-Combinator. We're an alternative to Auth0, Firebase Auth and AWS Cognito. Using our SDKs developers can add secure, hassle free authentication to their mobile application or website in less than a day. We enable startups to launch quicker and focus on their core product offering. We're a remote company with offices in San Francisco, California, USA and Mumbai, Maharashtra, India. We provide the following features: 1. Different types of login: - Email / password - Passwordless (OTP or Magic link based) - Social / OAuth 2.0 - Multi-factor authentication - Microservice authentication 2. Access control (RBAC) 3. Session management 4. User management 5. Self hosted / managed cloud For more information, please visit: https://github.com/supertokens
SlashID
slashid.dev
SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your APIs and workloads in minutes. Gate can also enforce passkeys and SSO on any internal application without any code modification. SlashID Access is the most reliable and secure user identity management module thanks to our HSM-backed, globally-replicated, serverless architecture. With Access, you can implement passwordless authentication flows, multi-tenancy, one-click user invitations, RBAC, SAML and MFA in hours, not weeks. Access minimizes latency for your users, seamlessly handles traffic spikes and avoids downtime and customer data breaches.
Nametag
getnametag.com
Nametag stops AI-powered attackers while saving 30% of your helpdesk costs. Nametag is the first identity verification platform for secure account recovery. Complete your IAM and MFA configuration with plug-and-play solutions that protect critical moments like MFA resets, password changes, and employee onboarding, while unlocking new automations and cost savings through self-service and agent-assisted workflows. Nametag solutions are built on Deepfake Defense™, the next-generation identity verification (IDV) engine that combines Cryptographic Attestation™, Adaptive Document Verification™, Spatial Selfie™ and other features to prevent AI-powered impersonation. It’s the only IDV that delivers the identity assurance needed in the age of generative AI and deepfakes. Global enterprises across social media, software, healthcare, insurance, finance, higher education and other industries trust Nametag to deliver secure, integrated account protection and cost savings at scale. Nametag customers eliminate over 50% of their IT tickets, reduce helpdesk costs by 30%, boost helpdesk agent efficiency by 5x, improve user experiences, and prevent account takeovers that lead to data breaches and ransomware attacks.
Cerby
cerby.com
Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on and lifecycle management capabilities. With Cerby, identity teams can extend access, minimize risk, and lower costs.
Ory
ory.sh
Ory Network is a global, high availability and low latency user identity & access management network that protects identities and other first party data. It offers cloud-native, end-to-end services dedicated to securing and managing user authentication, authorisation and API protection for humans, robots, devices, and software across various internet services. State-of-the-art solutions for access security include passkeys, passwordless login, social login, second factor authentication, multi factor authentication and hardware tokens. Ory Network helps its customers use zero-trust security across their stack including data protection, compliance and risk management. It delivers information security using advanced AI analytics for any data created by system access including authentication, authorisation and API traffic. Ory is an open source organization welcoming collaboration and contributions to its leading products from an active global community. With more than 30,000 community members and over 250 GitHub repositories, Ory maintains the world’s leading open-source identity management, authentication and authorization ecosystem and community. Ory Network builds on this knowledge and experience.
SSOJet
ssojet.com
SSOJet is an all-in-one solution for user management for your B2B SaaS that reduces onboarding time, makes it easy for new team members to get up and running. Simple integration, less code, and no headaches.
Smile ID
usesmileid.com
Smile ID provides the best Africa-focused solutions for real-time Digital KYC, Identity Verification, User Onboarding, Document Verification, Liveness Checks, Face Verification, Anti-fraud, Know your Business (KYB), and Identity Data Deduplication across Africa. We are building the tools and software that make it easier for millions of Africans to prove and verify their identity online. Our platform includes SDKs and APIs for User Onboarding, Digital KYC, Identity Verification, Document Verification, Face Verification, Anti-fraud, and ID validation in mobile applications and on the web. Our identity verification and artificial intelligence tools have been specially designed for African faces and identities. Our mission is to make the benefits of a modern digital lifestyle universally accessible by expanding trust in underserved markets. We are backed by Costanoa Ventures, Future Africa, PTB Ventures, Khosla Impact, 500 Startups, CRE Venture Capital etc Subscribe to Identity Illustrated - A newsletter by Smile ID enabling African business leaders to understand the continent's complex ID, regulatory and fraud landscape one illustration at a time - https://identityillustrated.com/
Checkboard
checkboard.com
Checkboard is your all-in-one compliance platform. Based in the UK, Checkboard offers Law firms, Conveyancers, Estate Agents, Landlords and Property Developers the ability to perform the most valuable AML, KYC, and Biometric ID checks. Allowing property professionals full autonomy as they can run them directly from the slick Checkboard platform and receive a comprehensive rated report on their clients within 15 minutes.
Sardine
sardine.ai
Sardine is a leader in financial crime prevention. Using proprietary device intelligence and behavior biometrics, Sardine applies machine learning to detect and stop fraud before it happens. The platform includes tools for identity verification, fraud prevention and investigation, AML monitoring, and case management. Over 250 companies use Sardine to prevent fake account creation, social engineering scams, account takeovers, bot attacks, payment fraud, and money laundering.
Vozy
vozy.ai
Vozy is an artificial intelligence voice platform that helps companies change the way they interact with their customers, using voice assistants and conversational AI. The company's platform combines conversational artificial intelligence (AI) and contextual voice assistants to automate communication across self-management or one-on-onetailored chats, allowing customer-centric businesses to deliver customized customer experiences at scale while cutting costs.
Synaps
synaps.io
Effortlessly onboard your users while staying compliant with regulations. Synaps supports you throughout your entire project according to your identification needs. Our KYC (Know Your Customer) solution is the ultimate tool for businesses seeking to streamline customer onboarding while ensuring compliance with regulatory requirements. With advanced ID verification and authentication technologies, our solution makes it easy to verify the identities of customers and prevent identity fraud. Plus, our highly customizable solution integrates seamlessly with existing systems, providing a frictionless customer experience while safeguarding sensitive customer data. Trust us to help you onboard customers quickly, securely, and with ease.
Accredify
accredify.io
Accredify is pioneering the world’s transition to verifiable data. Accredify is Asia Pacific’s award-winning leading verifiable technology solutions provider. By enabling automation and secure information exchange, Accredify provides clientele with the technology to simplify complex processes and discover new frontiers of digital trust. With a dedicated team that embraces the highest standards of customer service, security, and privacy, Accredify’s mission is to be the foremost verifiable technology solutions provider for moments when trust matters most. For more information, visit www.accredify.io and follow us on LinkedIn @Accredify
Youverse
youverse.id
Youverse was born from a dream. A dream about managing our accounts without hassle; and never having to remember one single password or carry any cards. But we wanted something special, we wanted users to authenticate without having to disclose their biometrics to anyone. So, we began building the future together as a team. In the Youverse vision of the world, every interaction requiring authentication should be possible with a simple look. With a top-tier algorithm and high accuracy rate, Youverse develops face authentication products based on a decentralized architecture. The user is the only owner of their own identity. No one can track back the biometric template, not even Youverse.
Havoc Shield
havocshield.com
All-in-one cybersecurity solution for financial services. Built to satisfy GLBA, FTC Safeguards, IRS Tax Preparer, New York DFS and other financial industry security requirements. Havoc Shield quickly removes the fear and risk of a lacking cybersecurity program by providing an industry-compliant plan, expert guidance, and professional security tools in an all-in one-platform.
Akeyless
akeyless.io
Akeyless Security is the company behind Akeyless Platform, a cloud-native SaaS-based approach to help manage enterprise secrets - credentials, certificates, and keys - while effectively phasing out conventional vaults and slashing associated costs by up to 70%. Designed for Infosec and DevOps professionals in enterprise hybrid and multi-cloud environments, the Akeyless platform efficiently controls secrets sprawl and automates secrets management. The platform also provides extensions to Secure Remote Access, Key Management and Password Management solutions. Leveraging patented Distributed Fragments Cryptography (DFC™), Akeyless is a trusted partner of many Fortune 500 companies and enables them to have safe and complete control over their secrets.
1Fort
1fort.com
1Fort streamlines the process of placing cyber insurance for middle-market businesses, saving insurance brokers and their clients time and money. Brokers use 1Fort to quote more markets in less time by helping their clients get insurable in days, not weeks. Businesses use 1Fort to automate up to 90% of the work to meet security requirements, enabling them to unlock better-priced policies and more comprehensive coverage.
TeamPassword
teampassword.com
TeamPassword is the most efficient way to manage multiple logins for any business that needs to save time and keep projects moving. It’s a cloud-based platform that helps you manage and share access to the apps, services, and tools your team needs. We make it easy to organize access to individual logins, as well as a collection of logins - perfect for Client Teams and Departments. We make on-boarding new employees and clients, and off-boarding easy. With just 2 steps, TeamPassword saves our clients 120 minutes on average when it comes to on-boarding new staff and clients. Off-boarding takes just a single step. We’ve made it seamless to use TeamPassword with a Google Sign In feature and Browser Extensions that offer one click access to logins without interrupting daily workflow. TeamPassword helps you immediately add more security to your process. The best way to keep secure across multiple tools is to have randomized, unique, complex password for each tool. TeamPassword allows your team to generate strong passwords for each tool with a built in password generator, and does the work to remember the passwords for you, so there’s no extra work in having a different password for each tool. The Admin Dashboard gives you oversight of login access for each Team Member.
Hypervault
hypervault.com
Say goodbye to your traditional password manager. Store all your companies' sensitive data in our digital vault. Collaborate securely, with your team or your customers. Create your own data categories to store your data. Separate data over different workspaces.
Backbone
backboneiq.com
Backbone is the world's first supply mesh software providing supply chain solutions for an interconnected world.
BastionPass
bastionpass.com
BastionPass – a powerful password management solution for individuals, families, teams, and businesses. BastionPass was built out of the necessity to create an all-encompassing, collaborative platform, which can be utilized by family or coworkers in a way that other password manager solutions do not offer. Since inception, our focus has been to provide single identity management and sharing capabilities with a simple interface, creating a safe and effective solution for password management among individuals or team members. Say Goodbye to Password Fuss! With BastionPass you can save, organize, and share passwords with family or colleagues on different accounts using a single online identity. Sign in once with your master password and our plugin will log you in everywhere else automatically. Conveniently access, manage or share your passwords on any platform from the desktop (web application or browser plugin) or mobile (iOS or Android). Security you can trust. BastionPass infrastructure and software have been audited by Nettitude – an award-winning cybersecurity company. Our encryption methods meet or exceed the highest industry standards for security. Learn more on our security page.
CommonKey
commonkey.com
CommonKey is your team password manager that increases productivity and security helping manage all your cloud apps with a click of a button.
ElePass
elepass.io
ElePass is a one-click solution that grants agency teams instant access to client passwords without compromising their integrity. With airtight security and total ease-of-use, ElePass takes risk out of the equation.
AccessOwl
accessowl.io
Orchestrate your employees' access to SaaS tools. Automate access requests, approvals and provisioning workflows. Automate on- & offboarding workflows Covering the entire employee lifecycle: AccessOwl ensures that new employees have access to all relevant tools on their starting date. Offboarding an user is as simple as a click of a button and no access is ever forgotten. Aligning HR, IT and line manager — eliminating the need for back-and-forth communication. Simplify approval workflows Your team can easily request new accesses on-demand via self-service — without leaving Slack. Give IT teams and tool owners full control over costs and access rights in an easy and seamless way. Make your auditors happy Get a crystal clear audit trail of who has been given access to which resource, when and why — available at the push of a button. Ensure that everyone has only the most necessary permissions .
CloudEagle.ai
cloudeagle.ai
CloudEagle.ai helps IT, finance and procurement teams at Ringcentral, Shiji, Recroom save 10-30% on their software spend and hundreds of hours managing and renewing their SaaS apps. It provides 100% visibility into all applications, spend and vendors. With no code slack-enabled workflows customers automate procurement, renewals, employee onboarding/offboarding, and license harvesting. With detailed usage and benchmarking data, customers negotiate better with vendors & optimize tech stack.
Corma
corma.io
Access and Identity Management made simple. Corma is the access management platform to centralize all your apps, automate access reviews and provisioning while cutting software spend
Solvo
solvo.cloud
Solvo is a multi-dimensional cloud security platform that breaks down application, identity and data silos to proactively detect and mitigate cloud misconfigurations and vulnerabilities. Solvo’s adaptive security approach is based on a continuous cycle of threat discovery, analysis and prioritization, followed by least privilege policy optimization, validation and monitoring. Book a free demo: https://www.solvo.cloud/request-a-demo/ Try Solvo free for 14-days: https://www.solvo.cloud/freetrial/
Torq
torq.io
Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and precisely remediate security events and orchestrate complex security processes at scale. Fortune 500 enterprises, including the world’s biggest financial, technology, consumer packaged goods, fashion, hospitality, and sports apparel companies, are experiencing extraordinary outcomes with Torq.
Zygon
zygon.tech
Automate the control of all the SaaS applications used by your team. From app inventory to upgrading your authentication methods, our automations give you a much needed relief in controlling SaaS sprawl. - Minimize SaaS Surface Attack - Pragmatic Security Awareness - Upgrading Authentication Security (SSO rollout) - Collaborator Onboarding and Offboarding - SOC 2 and ISO Compliance
Zluri
zluri.com
Zluri is a nex-gen Identity Governance and Administration platform that enables IT and security teams to discover identities and applications, streamline access management, and automate access reviews—all from a single, intuitive interface. With Zluri, organizations automate compliance readiness for SOX, HIPAA, SOC 2, and more—ensuring the right people have the right access to the right applications at the right time, with minimal time and manual effort.
Lumos
lumos.com
You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos is the first app governance platform that automates access requests, enforces least privilege, speeds up user access reviews, and eliminates extra SaaS app spending. Gone are the technology silos that left IT, Security, Compliance, and Finance in the dark. With Lumos, you have visibility into app usage, entitlements, and spending - and the power to take action on that data. The impact? Disappearing IT support costs, Just-in-Time Access (JIT) with no audit spreadsheets and VLookups. All this equals guaranteed software savings.
YeshID
yeshid.com
The all-in-one identity management tool for growing organizations YeshID is the all-in-one identity management tool for growing organizations. It provides a streamlined, repeatable, efficient, and compliant way to manage identities and applications. - A streamlined, repeatable, efficient, and compliant way for Super Admins to manage identities and applications — then get back to their other job(s). - Templatize and schedule onboarding and offboarding tasks to set up a repeatable process for ease and speed. - Assign application administrator(s) then automatically route requests for provisioning to the proper product admins. - Passkey-powered two-factor authentication means no more passwords, and puts access at your fingertips — literally. - Track provisioning/deprovisioning in a single dashboard to offboard a user with confidence while maintaining compliance and reducing license costs. - Empower employees to initiate requests for new application access that are automatically routed to the proper application administrator. - Get access to an exclusive Slack community of small business hustlers and heroes just like you so we can share, support, and celebrate together. - The magic price tag of “free” means you can get started today, no budget approval process, no credit card required.
Adaptive
adaptive.live
Adaptive is a data security platform that allows organizations to manage and govern access to data sources, monitor database activity, classify and protect sensitive data. * Share Access, not Credentials Share privileged access to all data sources without sharing the actual credentials. Improve the security posture of your organization. * Non-Human Data Access Connect third-party tools or ETL pipelines through a central interface without exposing your datasource credentials. * Data Masking and Tokenization Mask and tokenize all sensitive data for non-privileged users without changing any access workflows, minimizing data exposure in case of a leak. * Comprehensive Auditability Enable identity-based audit trails across all resources. Monitor all commands, queries, and access attempts in real-time for compliance and forensics. * Data Classification Discover sensitive data automatically and classify them under different default and customizable labels. * Anomaly Detection Identify and alert unauthorized or malicious data activities on structured data sources using predefined policies. * Terraform Provider Use Terraform to provision and manage access and authorizations * Authorization Privileges Efficiently manage authorization with dynamic role-based access control * Automated Data Classification Identify sensitive data and apply appropriate protection measures * Request-Approval Workflows Request and approve resource access seamlessly via Slack, Teams, or email * SSO and Directory Sync Sync users directly from all SSO providers like Google, Okta, etc. * Compliance-enabled Policies Enable policies to stay compliant with standards like GDPR, HIPAA, etc. Adaptive’s integrated approach to data access and protection addresses blind spots in data security, making it well-suited for modern organizations where data is continually moving. Thanks to Adaptive’s agentless architecture, end users enjoy faster, auditable access and data protection across the infrastructure without altering existing workflows and tools.
ConductorOne
conductorone.com
ConductorOne helps organizations secure their workforce identities through modern access controls and governance. Security and IT teams use ConductorOne to automate user access reviews, identify and remove unused access, and save time with self-service access requests. Forward-thinking companies like DigitalOcean, Ramp Financial, Loom, and Baron Funds trust us to achieve least privilege and ensure compliance.
Apono
apono.io
Apono, led by cybersecurity and DevOps experts. “Apono” is the Hawaiian word for “approve”. The Apono platform is loved by DevOps, trusted by Security - supports customers like OpenWeb, Cybereason, HiredScore, Tomorrow.io and many more in automating permission management. Providing a frictionless experience for users with the visibility and compliance needed by security to win more business. Apono helps customers move to zero standing, just in time permissions, get started in minutes at https://www.apono.io
Curity
curity.io
Curity is a leading provider of IAM and API security technology that enables user authentication and authorization for a wide range of digital services. The Curity Identity Server is highly scalable, handles the complexities of the leading identity standards, making them easier to use, customize and deploy. Today, the Curity Identity Server is the most complete OAuth and OpenID Connect server, and we enjoy the trust of large organizations in most industries, including financial services, telecom, retail, gaming, energy, and government services across many countries.
P0 Security
p0.dev
P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged access. P0 automates granular, just-in-time and short-lived privileged access grants in the most developer-friendly UX possible. No more tickets or configuring static groups. Enter right-sized, just-in-time, ephemeral access.
Synk.To
synk.to
Synk.to is a cloud-first identity management platform designed to seamlessly integrate with your favorite SaaS solutions, including Google Workspace, Jira, Slack, Microsoft Entra ID, Zoom, Confluence, and more. With Synk.to, you can effortlessly synchronize users and groups across all your applications. Our platform enables you to onboard and offboard employees in minutes, conduct instant access rights reviews, and monitor SaaS license usage—all from a single interface. Synk.to simplifies identity management, making your SaaS management more efficient and secure.
TeleSign
telesign.com
Telesign provides Continuous Trust™ to leading global enterprises by connecting, protecting, and defending their digital identities. Telesign verifies over five billion unique phone numbers a month, representing half of the world’s mobile users, and provides critical insight into the remaining billions. The company’s powerful AI and extensive data science deliver identity with a unique combination of speed, accuracy, and global reach. Telesign solutions prevent fraud, secure communications, and enable the digital economy by allowing companies and customers to engage with confidence.
Kount
kount.com
Kount is trust and safety technology. Businesses pick the solutions that are relevant to their unique challenges, and we help them grow with confidence — no matter the industry. We use data-driven decisions, advanced machine learning, and decades of experience to overcome the challenges that commonly plague today’s growing businesses. The result is greater confidence in every interaction.
Castle
castle.io
Castle is an identity and fraud risk management platform. We help security and fraud teams discover, investigate, report on and ultimately stop fraud at signup, login, and during transactions. Our SDKs integrate with your application code, after which security and fraud analysts use our website to monitor and manage attacks and fraud.
© 2025 WebCatalog, Inc.