Logo of Identity and Access Management

Identity and Access Management

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
45% increase in the last year
Web traffic
25% increase in the last quarter
Financing
July 2023 - $5M

Identity and Access Management description

Identity and Access Management (IAM) software controls who gets access to what within your company's digital systems. It ensures that only the right people have access to sensitive information and resources. IAM solutions often offer features like single sign-on for employees and stronger security measures to protect against unauthorized access.


Who is Identity and Access Management best for

Identity and Access Management (IAM) software controls access to digital systems, ensuring only authorized users access sensitive information. It offers features like single sign-on and enhanced security measures to prevent unauthorized access. IAM solutions are essential for maintaining data security and regulatory compliance.

  • Not suitable for any company size.

  • Suitable for all industries.


Identity and Access Management features

Type in the name of the feature or in your own words tell us what you need
Supported

Universal access governance for the cloud suggests comprehensive control over cloud resources.

Supported

While not explicitly stated, SSO is a common feature in IAM, implied by 'universal access'.

Supported

This is a core aspect of IAM, managing 'who gets access to what'.

Supported

Implicit in security and governance is the need for tracking access.


Identity and Access Management pricing

See the Identity and Access Management pricing page.

Professional

25 /user/month

Ideal for smaller teams needing our core functionalities, with essential integrations and audit capabilities. Includes: Up to 20 users, unlimited access requests, 1 IAM Audit per resource per month, integrations with Slack, PagerDuty + 3 cloud resources, 1 identity provider and 1-month access logs retention.

Enterprise

Custom

Designed for large organizations, offering unlimited functionality, with top-tier support and extensive integrations. Includes: Unlimited users, unlimited access requests, unlimited IAM audits, unlimited integrations, additional resources such as Snowflake, Kubernetes, Postgres, etc., unlimited identity providers and 3-month access logs retention.


Identity and Access Management alternatives

  • Logo of Microsoft Entra
    Microsoft Entra
    Better fit for larger organizations and those heavily reliant on the Microsoft ecosystem. Offers more features, including single sign-on, multi-factor authentication, and identity governance. Has broader industry applicability. Boasts more integrations, notably with other Microsoft products. Is growing faster in terms of website traffic. Users appreciate its strong security and seamless Microsoft integrations but dislike its complexity and cost.
    Read more
  • Logo of Cakewalk
    Cakewalk
    Better for small and medium businesses. Has higher ratings on G2. Grows slower.
    Read more
  • Logo of Corma
    Corma
    More focused on mid-sized companies. Has more momentum based on employee growth. Offers a user-friendly interface and automated workflows.
    Read more
  • Logo of iManage Platform
    iManage Platform
    Better for document and email management, especially for legal and financial services. More suitable for mid-size to large companies. Stronger in software, legal, and marketing industries. Has slower search functionality and can be difficult to learn.
    Read more
  • Logo of PropelAuth
    PropelAuth
    Better for smaller companies and B2B SaaS businesses. PropelAuth has faster website traffic growth and excels in customer service, ease of use, and implementation. Users love its intuitive interface and efficient handling of B2B authentication. A strong PropelAuth alternative for customer identity and access management.
    Read more
  • Logo of Citrix Secure Access
    Citrix Secure Access
    Better for enterprise companies, especially in IT and professional services. Popular and user-friendly, but has negative customer service reviews and some performance issues. A Citrix Secure Access alternative.
    Read more

Identity and Access Management FAQ

  • What is Identity and Access Management and what does Identity and Access Management do?

    Identity and Access Management (IAM) software controls access to digital systems. It ensures only authorized users access sensitive data and resources, often through features like single sign-on and enhanced security measures, simplifying user access and bolstering data protection.

  • How does Identity and Access Management integrate with other tools?

    There is no information available about specific integrations for Identity and Access Management. However, IAM solutions commonly integrate with directories, HR systems, and other security tools.

  • What the main competitors of Identity and Access Management?

    Top alternatives to Identity and Access Management (IAM) include Microsoft Entra, Cakewalk, and Corma. These competitors offer similar functionalities, such as single sign-on, access control management, and integration with other business systems. They cater to various business sizes and focus on simplifying secure access while improving security and compliance.

  • Is Identity and Access Management legit?

    Yes, Identity and Access Management (IAM) is a legitimate cybersecurity measure. It safeguards sensitive data by controlling user access, ensuring only authorized individuals can access specific resources. This enhances security and protects against unauthorized access.

  • How much does Identity and Access Management cost?

    Identity and access management (IAM) pricing for P0 Security starts at $25 per user per month for the Professional plan. The Enterprise plan offers custom pricing for larger organizations needing unlimited features and integrations. No free trial or free plan is available.

  • Is Identity and Access Management customer service good?

    There is no information available about the customer service quality of Identity and Access Management.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.