Logo of Identity and Access Management

Identity and Access Management

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
45% increase in the last year
Web traffic
25% increase in the last quarter
Financing
July 2023 - $5M

Identity and Access Management description

Identity and Access Management (IAM) software controls who gets access to what within your company's digital systems. It ensures that only the right people have access to sensitive information and resources. IAM solutions often offer features like single sign-on for employees and stronger security measures to protect against unauthorized access.


Who is Identity and Access Management best for

Identity and Access Management (IAM) software controls access to digital systems, ensuring only authorized users access sensitive information. It offers features like single sign-on and enhanced security measures to prevent unauthorized access. IAM solutions are essential for maintaining data security and regulatory compliance.

  • Not suitable for any company size.

  • Suitable for all industries.


Identity and Access Management features

Supported

Universal access governance for the cloud suggests comprehensive control over cloud resources.

Supported

While not explicitly stated, SSO is a common feature in IAM, implied by 'universal access'.

Supported

This is a core aspect of IAM, managing 'who gets access to what'.

Supported

Implicit in security and governance is the need for tracking access.


Identity and Access Management pricing

See the Identity and Access Management pricing page.

Professional
25 /user/month

Ideal for smaller teams needing our core functionalities, with essential integrations and audit capabilities. Includes: Up to 20 users, unlimited access requests, 1 IAM Audit per resource per month, integrations with Slack, PagerDuty + 3 cloud resources, 1 identity provider and 1-month access logs retention.

Enterprise
Custom

Designed for large organizations, offering unlimited functionality, with top-tier support and extensive integrations. Includes: Unlimited users, unlimited access requests, unlimited IAM audits, unlimited integrations, additional resources such as Snowflake, Kubernetes, Postgres, etc., unlimited identity providers and 3-month access logs retention.


Identity and Access Management alternatives

  • Logo of ConductorOne
    ConductorOne
    Automated access control, simplified security, and effortless compliance.
    Read more
  • Logo of Cakewalk
    Cakewalk
    Effortless app access management: automate, control, secure.
    Read more
  • Logo of AWS Identity and Access Management (IAM)
    AWS Identity and Access Management (IAM)
    Secure cloud access: control who does what.
    Read more
  • Logo of PingOne for Enterprise
    PingOne for Enterprise
    Secure, streamlined logins for all your business apps.
    Read more
  • Logo of CrossIdeas
    CrossIdeas
    Securely manage user access and permissions across your business.
    Read more
  • Logo of PingAccess
    PingAccess
    Securely control access to your apps, anywhere, simply.
    Read more

Identity and Access Management FAQ

  • What is Identity and Access Management and what does Identity and Access Management do?

    Identity and Access Management (IAM) software controls access to digital systems. It ensures only authorized users access sensitive data and resources, often through features like single sign-on and enhanced security measures, simplifying user access and bolstering data protection.

  • How does Identity and Access Management integrate with other tools?

    There is no information available about specific integrations for Identity and Access Management. However, IAM solutions commonly integrate with directories, HR systems, and other security tools.

  • What the main competitors of Identity and Access Management?

    Top alternatives to Identity and Access Management (IAM) include Microsoft Entra, Cakewalk, and Corma. These competitors offer similar functionalities, such as single sign-on, access control management, and integration with other business systems. They cater to various business sizes and focus on simplifying secure access while improving security and compliance.

  • Is Identity and Access Management legit?

    Yes, Identity and Access Management (IAM) is a legitimate cybersecurity measure. It safeguards sensitive data by controlling user access, ensuring only authorized individuals can access specific resources. This enhances security and protects against unauthorized access.

  • How much does Identity and Access Management cost?

    Identity and access management (IAM) pricing for P0 Security starts at $25 per user per month for the Professional plan. The Enterprise plan offers custom pricing for larger organizations needing unlimited features and integrations. No free trial or free plan is available.

  • Is Identity and Access Management customer service good?

    There is no information available about the customer service quality of Identity and Access Management.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.

NEW: Introducing Gralio Screen Buddy

An AI tool that observes your work, finds inefficiencies, and suggests smarter ways to do things. Maybe you can use your tools better, automate tasks, or switch software.

For Individuals
Streamline your daily tasks, get helpful AI tips, and find the right tools for your workflow.
For Businesses
See how your team really works, uncover automation opportunities, and get software recommendations tailored to your processes.