The following Identity and Access Management vendor list includes strong contenders in the IAM technology and software space. Identity Management Institute and many other companies which provide identity and access management services such as compliance, risk management, training, certification, evaluation, and content publishing are not included in the following IAM vendor list.
The company overview column of the following list is obtained from the public domain such as Wikipedia and/or company’s own website and social media pages such as Twitter. The companies listed in the following identity and access management vendor list are gathered form publicly available information sources such as independent research reports and reviews. This document is updated periodically to reflect changes in the industry including new or improved products offered by existing identity and access management companies, new entrants in the IdM/IAM space, and rising stars. This table is in alphabetical order and best viewed on desktop.
Identity and Access Management Vendor List
|Bitium||Bitium is a Santa Monica, California-based developer of the cloud service Bitium, which provides single sign-on and identity management for Software as a Service cloud-based applications.||bitium.com|
|CA Technologies||Through a simple, business-oriented interface, your business users can easily request access and perform self-service, while your managers can approve or certify access in a way that improves their overall productivity using CA Technologies products. Plus, you have industry-leading provisioning and governance capabilities that help you easily ensure that all users have the correct access.||ca.com|
|Cenrify||Centrify is an identity management software and cloud-based Identity-as-a-Service provider that allows enterprises to manage identities and secure access across computer networks and cloud computing environments.||centrify.com|
|CyberArk||CyberArk is an information security company offering Privileged Account Security. The company's technology is utilized primarily in the financial services, energy, retail and healthcare markets.||cyberark.com|
|Core security (Courion)||Core Security is a computer and network security company that provides an attack intelligence platform, vulnerability management and network penetration testing measurement software products and services.||coresecurity.com|
|Covisint||Covisint provides the cloud platform of choice for enabling the Internet of Things and identity-centric solutions.||covisint.com|
|Empower ID||Empower ID's out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers.||empowerid.com|
|Fischer International||Fischer Identity enables organizational effectiveness and agility, mitigates risk, controls costs and enables regulatory compliance.||fischerinternational.com|
|ForgeRock||ForgeRock is a multinational identity and access management software company headquartered in San Francisco, U.S.A. The company develops open source identity and access management products for cloud, social, mobile, and enterprise environments.||forgerock.com|
|Hitachi ID||Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions||hitachi-id.com|
|IBM||IBM Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.||ibm.com|
|Ilantus||ilantus specializes in Identity Management, Governance and Access domain with a unique focus in implementation and Managed Services.||ilantus.com|
|i-Sprint Innovations||i-Sprint, established in the year 2000, is a world-class solution provider in Identity, Credential, and Access Management for industries that are security sensitive, require channel monitoring and quality data for better user management.||i-sprint.com|
|iWelcome||iWelcome offers an Identity Platform for Identity Management as-a-Service for consumers and (extended) workforce.||iwelcome.com|
|Microsoft||Microsoft product helps centrally manage identities across your datacenter and the cloud with a mobile device management software solution, providing secure single sign-on to all of your applications.||azure.microsoft.com|
|NetIQ||NetIQ is an enterprise software company based in Houston, Texas. NetIQ is owned by Micro Focus International. The company provides products for identity and access management, security and data center management.||netiq.com|
|Okta||Okta Identity Management has been a player in the Identity-Management-as-a-Service (IDaaS) space since the early days. Okta incorporates attributes from multiple identity providers seamlessly.||okta.com|
|One Identity||A subset of Quest, One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. Their solutions enhance business agility while addressing your IAM challenges with on-premises, cloud and hybrid environments.||oneidentity.com/|
|OneLogin||OneLogin, Inc. is the developer of the service OneLogin, which provides single sign-on and identity management for cloud-based applications.||onelogin.com|
|Oracle||Oracle’s complete, integrated next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions that reduce operational costs, achieve rapid compliance with regulatory mandates, and secure sensitive applications and data regardless of whether they are hosted on premises or in the cloud.||oracle.com|
|Optimal IdM||Whether on-premise or in the cloud, Optimal IdM award-winning suite of products offer fully customizable, enterprise solutions that meet the specific identity management needs of your organization at an affordable price.||optimalidm.com|
|Ping Identity||Founded in 2002, Ping’s singular vision has always been to put identity at the center of security in a world without borders. In just over a decade, they established the foundation of this vision through open identity standards. This way, identity as the unifying paradigm of control could one day secure all users, devices, networks and applications.||pingidentity.com|
|SailPoint||SailPoint identity governance tools bring the Power of Identity™ to enterprise customers around the world.||sailpoint.com|
|Salesforce||Salesforce is a cloud computing and customer relationship management company headquartered in San Francisco, California.||salesforce.com|
|Saviynt||Next Generation Access Governance & Intelligence for Cloud, Big Data & Enterprise Applications to address security, compliance and regulatory challenges.||Saviynt.com|
|Simeio Solutions||Simeio Solutions is a unique strategic partner offering a comprehensive suite of enterprise Identity and Access Management (IAM) resources designed to provide a fully integrated solution that meets the specific needs of each client.||simeiosolutions.com|
|Symantec||Authenticate to any cloud application while employing Symantec’s Global Intelligence Network to perform risk-analysis and detect location-based anomalies, Passwordless on and off-network authentication fusing integrated desktop, and our one-touch Symantec VIP authentication for easy access.||symantec.com|
|LastPass||LastPass is a password manager that stores encrypted passwords online. It offers a web interface, and plugins for various web browsers and apps for many smartphones.||lastpass.com|
More Identity and Access Management Companies
The companies in the following identity and access management vendor list also offer similar solutions and are being tracked and considered for additional research. The list below is not in any particular order.
- Digital Guardian
- SMS Passcode
- Avatier Corporation
- Beta Systems
- Micro Focus
- UXP Systems
- Identity Automation
- Evidian, Atos Technologies
- Brainwaive GRC
- Sath Inc.
Please contact Identity Management Institute to order research reports on a specific company, product and service, or for advertising and marketing opportunities, reporting errors, and, suggesting new additions.
Identity and access management companies are encouraged to join Identity Management Institute as member companies to demonstrate commitment to the industry by combining employee certification with powerful marketing features. Visit our company membership page for details about our plans.