---
description: Page 3 - Discover the best Single Sign On Software in Ireland. Compare top Single Sign On Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 3 - Best Single Sign On Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Single Sign On Software](https://www.softwareadvice.ie/directory/4347/single-sign-on/software) > [Page 3](https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3)

# Single Sign On Software

Canonical: https://www.softwareadvice.ie/directory/4347/single-sign-on/software

Page: 3 / 4\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=2)\
Next: [Next page](https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=4)

-----

## Products

1. [CoreOne Suite](https://www.softwareadvice.ie/software/230137/coreone-suite) — 5.0/5 (1 reviews) — CoreOne Suite is a cloud-based and on-premise identity and access management(IAM) solution that provides solutions fo...
2. [SuperTokens](https://www.softwareadvice.ie/software/185869/supertokens) — 5.0/5 (1 reviews) — SuperTokens is an open source user authentication solution backed by Y-Combinator and one of the fastest growing OS s...
3. [Atlassian Access](https://www.softwareadvice.ie/software/431253/atlassian-access) — 5.0/5 (1 reviews) — Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud application...
4. [Venn](https://www.softwareadvice.ie/software/357710/workplace) — 5.0/5 (1 reviews) — Venn is revolutionizing how businesses enable remote workers and contractors, removing the burden of buying and secur...
5. [TeleSign Platform](https://www.softwareadvice.ie/software/368816/telesign-platform) — 5.0/5 (1 reviews) — TeleSign connects and protects online experiences with sophisticated customer identity and engagement solutions to en...
6. [LogonBox](https://www.softwareadvice.ie/software/241509/logonbox) — 5.0/5 (1 reviews) — LogonBox is a self-service password reset (SSPR) solution that helps businesses manage passwords across multiple exte...
7. [Wultra Mobile-First Authentication](https://www.softwareadvice.ie/software/411681/powerauth) — 5.0/5 (1 reviews) — Wultra Mobile-First Authentication is a passwordless authentication solution for banks and fintech that offers strong...
8. [The OptimalCloud](https://www.softwareadvice.ie/software/317728/the-optimalcloud) — 4.0/5 (1 reviews) — The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various ...
9. [SSOJet](https://www.softwareadvice.ie/software/451142/SSOJet) — 5.0/5 (1 reviews) — SSOJet: Streamlined User Management for Your B2B SaaS Stop wasting time on onboarding and focus on growing your busin...
10. [PingFederate](https://www.softwareadvice.ie/software/332266/pingfederate) — 5.0/5 (1 reviews) — PingFederate is a cloud-based software designed to streamline user authentication and single sign-on (SSO) authorizat...
11. [Appsian Security Platform](https://www.softwareadvice.ie/software/182143/appsian-security-platform) (0 reviews) — Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentic...
12. [Efecte IGA](https://www.softwareadvice.ie/software/192772/efecte-identity-governance-and-administration) (0 reviews) — Efecte IAM helps enterprises automate identity and access management operations via a unified portal. The built-in pr...
13. [swIDch Auth SDK](https://www.softwareadvice.ie/software/320674/otac) (0 reviews) — swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOT...
14. [Akku (Cloud Access Security Broker)](https://www.softwareadvice.ie/software/178249/akku-cloud-access-security-broker) (0 reviews) — Akku is a cloud-based identity and access management solution that helps businesses protect and manage enterprise dat...
15. [strongDM](https://www.softwareadvice.ie/software/270142/strongdm) (0 reviews) — strongDM is a database management software tool designed for SMBs and agencies. It aims to provide technical staff, i...
16. [ABIS as a Service](https://www.softwareadvice.ie/software/255954/abis-as-a-service) (0 reviews) — Abi is a complete information system on the client, allowing to safely store and use information. It also provides mu...
17. [SafeNet Trusted Access](https://www.softwareadvice.ie/software/446053/safenet-trusted-access) (0 reviews) — SafeNet Trusted Access: Provide simple, secure access to all your apps with authentication everywhere. Cloud-based ap...
18. [EmpowerID](https://www.softwareadvice.ie/software/366337/empowerid) (0 reviews) — EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing...
19. [Crowd](https://www.softwareadvice.ie/software/357550/crowd) (0 reviews) — Crowd is an Enterprise-grade single sign-on and identity management solution for Atlassian users. Use Crowd to manage...
20. [TrustLogin](https://www.softwareadvice.ie/software/393969/trustlogin) (0 reviews) — TrustLogin is a cloud-based solution that allows users to sign in to multiple cloud services using a single set of lo...
21. [Virtual Desktops](https://www.softwareadvice.ie/software/403441/virtual-desktops) (0 reviews) — ComputerVault Virtual Desktops are an on-premises virtual desktop infrastructure (VDI) solution that provides users w...
22. [Cyberelements](https://www.softwareadvice.ie/software/419007/cyberelements) (0 reviews) — Designed for businesses of all sizes, Cyberelements is a cloud-based access management solution that helps analyze us...
23. [Jira Oauth](https://www.softwareadvice.ie/software/371327/jira-oauth) (0 reviews) — Jira OAuth is a cloud-based platform that enables OAuth/OpenID Single Sign On (SSO) for Jira Software and Jira Servic...
24. [Systancia Access](https://www.softwareadvice.ie/software/421508/systancia-access) (0 reviews) — Systancia Access is an access management, user authentication, and authentication (Single Sign On) solution that prov...
25. [PropelAuth](https://www.softwareadvice.ie/software/401463/propelauth) (0 reviews) — PropelAuth is a cloud-based identity and access management solution for software applications catering to software co...

-----

Page: 3 / 4\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=2)\
Next: [Next page](https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=4)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.ie/directory/4528/security/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.ie/directory/4311/authentication/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.ie/directory/4427/ciam/software)
- [Access Governance Software](https://www.softwareadvice.ie/directory/4665/access-governance/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4347/single-sign-on/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@id":"https://www.softwareadvice.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Single Sign On Software","description":"Page 3 - Discover the best Single Sign On Software in Ireland. Compare top Single Sign On Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3","about":{"@id":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3#breadcrumblist"},"@id":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3#itemlist"},"publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@id":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Single Sign On Software","position":2,"item":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Best Single Sign On Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.ie/directory/4347/single-sign-on/software?page=3#itemlist","@type":"ItemList","itemListElement":[{"name":"CoreOne Suite","position":1,"description":"CoreOne Suite is a cloud-based and on-premise identity and access management(IAM) solution that provides solutions for Enterprise IAM, Customer IAM and Single-Sign On(SSO). Depending on the industry or business, CoreOne identity platform service is able to scale to any of these three modules. Key features include lifecycle identity management, access control, multi-factor authentication, and risk and audit analytics.\n\n\nWith lifecycle management, CoreOne offers automated capabilities and a Universal Directory for user provisioning and access management. Identity data can sourced from multiple sources such as Oracle databases, Microsoft Active Directory, SAP HCM and more by utilizing CoreOne Universal Connector. With this connector, CoreOne allows administrators to provision accounts and grant user access to cloud-based or on-premise applications. \n\n\nCoreOne offers increased security with multi-factor authentication(MFA) utilizing OTP and CoreOne's authenticator app. CoreOne's MFA alongside the SSO module provides users with a seamless and secure way of accessing cloud and local applications. For a secure system, CoreOne Suite Audit Trail logs any changes and updates to any user's account and allows administrators to generate reports and export those reports to any external software. This allows administrators to perform external or internal audits, preventing any possible risks to their business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/720bd5c0-ab14-4165-9b28-bc50719e76a0.png","url":"https://www.softwareadvice.ie/software/230137/coreone-suite","@type":"ListItem"},{"name":"SuperTokens","position":2,"description":"SuperTokens is an open source user authentication solution backed by Y-Combinator and one of the fastest growing OS startups of 2022 (Q1). \n\nWe're an alternative to Auth0, Firebase Auth and AWS Cognito. Using our SDKs developers around the world can add secure, hassle free authentication to their website or mobile application in less than a day.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/48d48f77-4e40-4594-9e60-ea75bf4623aa.png","url":"https://www.softwareadvice.ie/software/185869/supertokens","@type":"ListItem"},{"name":"Atlassian Access","position":3,"description":"Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud applications. With single sign-on (SSO), admins can set up one-click access to company apps and enable employees to deploy software. It allows users to enforce two-step verification (2FA) and revoke unauthorized tokens. Admins can also monitor usage and customize multiple authentication policies using a single dashboard, while reviewing audit logs and product reports. Integrations with other CASBs, 24/7 support, and customizable billing are some of the other key features offered by Atlassian Access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96f403cb-590e-4582-9c16-e390449d2daa.png","url":"https://www.softwareadvice.ie/software/431253/atlassian-access","@type":"ListItem"},{"name":"Venn","position":4,"description":"Venn is revolutionizing how businesses enable remote workers and contractors, removing the burden of buying and securing laptops or dealing with virtual desktops. Our patented technology provides companies with a new approach to securing workers on unmanaged or personal computers. \n\nWith Venn’s Blue Border™, work lives in a company-controlled Secure Enclave installed on the user’s computer, where all data is encrypted and access is managed. Work applications run locally within the Enclave – visually indicated by the Blue Border – isolating and protecting business activity from any personal use on the same computer. Company data is secured without controlling the entire device while ensuring end-user privacy for everything outside the Blue Border. As a result, IT teams can easily support Bring Your Own Device workforces without the cost, complexity, and usability challenges of virtual desktops.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ab5cd452-f0cc-4659-ba01-4718e186c7a8.jpeg","url":"https://www.softwareadvice.ie/software/357710/workplace","@type":"ListItem"},{"name":"TeleSign Platform","position":5,"description":"TeleSign connects and protects online experiences with sophisticated customer identity and engagement solutions to enables businesses to register accounts, verify phone numbers, identify users, prevent fraud, streamline customer engagement and more.\n\nThrough APIs that deliver user verification, data insights, and communications TeleSign solves today’s unique customer challenges by bridging your business to the complex world of global telecommunications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/56567ea9-01d7-4dae-b629-eb582aed613c.png","url":"https://www.softwareadvice.ie/software/368816/telesign-platform","@type":"ListItem"},{"name":"LogonBox","position":6,"description":"LogonBox is a self-service password reset (SSPR) solution that helps businesses manage passwords across multiple external systems, including GSuite, O365, Active Directory, Microsoft Azure, and more on a centralized platform. It allows administrators to configure multi-factor authentication, set up single sign-on, and assign privileged resource credentials, ensuring user and data security.\n\nLogonBox enables staff members to create security questions to reset or unlock accounts without involvement from the service desk. Employees can automatically generate system enrollment reminders and password expiration notifications. It offers a SAML-based identity provider, which allows staff members to log into multiple third-party services. Additionally, the built-in dashboard allows team members to track password history, user behavior, account activity, and session history.\n\nLogonBox allows organizations to integrate the platform with several third-party solutions such as Duo Authentication, Yubikey, Google Auth, and more. It is available on annual subscriptions and support is extended via documentation, video tutorials, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/acee1583-0160-4268-bc25-c9eb4323a77c.png","url":"https://www.softwareadvice.ie/software/241509/logonbox","@type":"ListItem"},{"name":"Wultra Mobile-First Authentication","position":7,"description":"Wultra Mobile-First Authentication is a passwordless authentication solution for banks and fintech that offers strong customer authentication (SCA) compliance with the PSD2 (Revised Payment Services Directive) regulations, ensuring a secured payment environment.\n\nWultra Mobile-First Authentication enables access to digital channels through biometric authentication, such as Face ID or Touch ID. The solution also supports multi-factor signatures with dynamic linking,","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46dea9b6-38a6-4212-98bf-f728b009f8e3.jpeg","url":"https://www.softwareadvice.ie/software/411681/powerauth","@type":"ListItem"},{"name":"The OptimalCloud","position":8,"description":"The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various applications using single sign-on (SSO) authentication technology. The platform includes audit trails, which enable organizations to view and monitor user activities across applications, groups and devices on a unified portal.\n\n\nThe OptimalCloud enables users to assign tasks to teams, reset passwords, submit registration requests, and approve workflows. It offers a variety of features such as a self-service portal, mobile device push authentication, multiple users, activity tracking, custom configuration and more. Additionally, the built-in multi-factor authentication functionality lets administrators manage access to applications on internal or external networks through one-time passwords and text-based verifications.\n\n\nThe OptimalCloud facilitates integration with various third-party applications including Dropbox, Zoho, Amazon Web Services, Confluence, CenturyLink and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76e2f4f9-c80f-4f81-9e17-03bb8768ad26.png","url":"https://www.softwareadvice.ie/software/317728/the-optimalcloud","@type":"ListItem"},{"name":"SSOJet","position":9,"description":"SSOJet: Streamlined User Management for Your B2B SaaS\nStop wasting time on onboarding and focus on growing your business. SSOJet is an all-in-one user management solution that simplifies onboarding for new team members, getting them up and running quickly.\n\nSecurity and compliance are built-in. SSOJet offers a modern single sign-on (SSO) solution that demonstrates your commitment to data protection. It integrates with over 100 applications and identity providers, so you can simply activate it without complex configurations.\n\nMFA for enhanced security. Multi-factor authentication (MFA) is a critical safeguard for B2B SaaS applications, and SSOJet includes it as a standard feature.\n\nSeamless integration with your existing infrastructure.  SSOJet integrates with your existing corporate directories and HRIS platforms, streamlining user management across your organization.\n\nSSOJet offers the essential features you need to empower your B2B SaaS application:\n\nReduced onboarding time\nSimplified user management\nModern and secure SSO\nBuilt-in MFA\nEasy integration with existing systems","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4b207003-078c-4acf-be29-a20f9436a0bb.png","url":"https://www.softwareadvice.ie/software/451142/SSOJet","@type":"ListItem"},{"name":"PingFederate","position":10,"description":"PingFederate is a cloud-based software designed to streamline user authentication and single sign-on (SSO) authorization process. With support for industry-standard identity protocols like OAuth, OpenID Connect, SAML, and WS-Federation, it integrates with existing systems and offers rapid deployment capabilities.\n\nPingFederate simplifies the implementation of federated identity networks, supporting browser-based SSO and integrating with a wide range of cloud, mobile, SaaS, API, and on-premises applications. Security measures such as multi-factor authentication (MFA), contextual MFA, and adaptive authentication help protect against unauthorized access and data breaches. It offers consistent sign-on and registration processes across channels, with pre-built templates for user registration and profile management. The platform also allows administrators to easily configure authentication policies, evaluate user request conditions, and create customized policies.\n\nWith PingFederate, organizations can achieve centralized identity management, eliminate insecure password practices, reduce the risk of unauthorized access, and minimize friction in the user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4fbe4a74-0e98-4246-83b4-2061452b9a58.png","url":"https://www.softwareadvice.ie/software/332266/pingfederate","@type":"ListItem"},{"name":"Appsian Security Platform","position":11,"description":"Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentication, network security, and other operations for PeopleSoft and SAP applications. The platform includes a transaction logging functionality, which lets administrators record user activities and session time.\n\n\nAppsian Security Platform allows IT teams to provide role-based permissions and hide data across search results, fields, queries and browsers via a unified portal. It offers a host of features such as remote access, configurable rule engine, location-based security, threat detection and prevention, risk assessment and more. Additionally, managers can generate reports to analyse usage trends, data access, privileged accounts usage, security alerts and other metrics using Appsian 360 application.\n\n\nAppsian Security Platform supports integration with various third-party systems including Oracle, Duo, Okta, Twilio and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd3ac52e-d138-450d-90b6-18161508aeb3.png","url":"https://www.softwareadvice.ie/software/182143/appsian-security-platform","@type":"ListItem"},{"name":"Efecte IGA","position":12,"description":"Efecte IAM helps enterprises automate identity and access management operations via a unified portal. The built-in predefined customizable workflows facilitate real-time management capabilities, enabling organizations to attend to identity and access requests. \n\nEfecte IAM lets users submit requests for business roles, new access and other services through a self-service portal. Managers can view and approve or reject the requests along with reasons. It offers a host of features such as customizable forms. real-time updates, interactive dashboard, graphs, reports, a drag-and-drop interface and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1d6e01e2-a65c-48d9-8970-ad5631a88ca3.png","url":"https://www.softwareadvice.ie/software/192772/efecte-identity-governance-and-administration","@type":"ListItem"},{"name":"swIDch Auth SDK","position":13,"description":"swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. \n\nswIDch Auth SDK's various functions are verified by FIDO alliance providing super secure passwordless authentication. The SDK also provides mobile OTP function that runs on a mobile application including the use of PIN inputs or fingerprint recognition, alongside mobile OTP which generates a one-time OTP number providing the same level of solid security as standard OTPs.\n\nFor an extra level of added security, swIDch Auth SDK provides login functions based on swIDch’s unparalleled  authentication technology, OTAC (One-Time Authentication Code). Even in a networkless environment, OTAC can identify users and devices by generating a one-time random code, providing an impenetrable authentication environment in cyber security.\n\nswIDch Auth SDK unprecedented pricing policy aims to empower organisations to develop innovative products and services, especially regarding authentication, identity and access management. The Pioneer membership, which consists of a one-pack license, is $5,000 whilst its Enterprise membership charges $45,000 allowing Unlimited Licensing for internal systems and 20 licenses for reselling. Both these memberships come with technical support services to help with any queries and technical requirements.\n\nswIDch Auth SDK is designed to empower System Integration companies, security solution vendors, organisations and enterprises, who want to deploy their developers and security teams to provide reliable all-in-one authentication based on proven international standard authentication security technology. Save time and increase efficiency with swIDch Auth SDK.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca86be52-cbd8-41d4-b08e-4c46e5926ad1.jpeg","url":"https://www.softwareadvice.ie/software/320674/otac","@type":"ListItem"},{"name":"Akku (Cloud Access Security Broker)","position":14,"description":"Akku is a cloud-based identity and access management solution that helps businesses protect and manage enterprise data through various security tools, including multi-factor authentication (MFA), single sign-on (SSO) and more. \n\nAkku allows organizations to establish, define and enforce password policies for employees in compliance with industry regulations. Managers can set up location or time-based restrictions on content and validate users’ identities through additional authentication methods, such as one-time passwords or push notifications. \n\nAkku facilitates integration with several third-party applications including Bitbucket, Slack, Salesforce and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d23ac41-a4d2-4599-959c-d7f95640dd84.png","url":"https://www.softwareadvice.ie/software/178249/akku-cloud-access-security-broker","@type":"ListItem"},{"name":"strongDM","position":15,"description":"strongDM is a database management software tool designed for SMBs and agencies. It aims to provide technical staff, including CTOs, CIOs, DevOps, and infrastructure engineers, secure access to their company's resources. It blends authentication, authorization, observability, and networking into a single dashboard for easy, secure, and convenient management access across the tech stack.\n\nThe tool facilitates SSO logins and management for any database, server, protocol, or environment. It comes with a NoSQL database, real-time monitoring, security audits, vulnerability protection, and audit trails for every SSH, RDP session, and query — all rolled into one.\n\nstrongDM lets administrators set up two-factor or multi-factor authentication, providing users with just-in-time access to the resources they need. Thanks to its granular audit trail, they can check team and individual user activity. They can also restrict access and grant role-based permissions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc9c7ad6-1099-438c-a99e-e6c8710e321c.png","url":"https://www.softwareadvice.ie/software/270142/strongdm","@type":"ListItem"},{"name":"ABIS as a Service","position":16,"description":"Abi is a complete information system on the client, allowing to safely store and use information. It also provides multi-step enrollment services, that start in a store or even at home with the collection of data as ID document and facial recognition, as the main sources of comparison for future validations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d97f4601-be55-4d31-af96-21906883825d.png","url":"https://www.softwareadvice.ie/software/255954/abis-as-a-service","@type":"ListItem"},{"name":"SafeNet Trusted Access","position":17,"description":"SafeNet Trusted Access: Provide simple, secure access to all your apps with authentication everywhere.\n\nCloud-based applications play a vital role in improving productivity and meeting the business goals of digital-first enterprises. Along with protecting your employees’ digital identities in a multi-cloud environment, you must also ensure the security of your users accessing sensitive data from literally anywhere.\n\nSafeNet Trusted Access is an access management and authentication service that ensures no user is a target by allowing you to expand authentication to all users and apps with diverse authentication capabilities. Because it gives you the power to control access to all apps with the right policy, you can enforce the right authentication method for the right user.\n \nSafeNet Trusted Access is unique in its ability to meet the diverse needs of diverse users in your organization by proposing the right authentication method for the right user. Organizations, no matter their size or industry, can securely manage their digital transformations by protecting more apps and more users through better MFA coverage. In today’s threat environment, all users and applications are potential targets. To ensure secure access anywhere, MFA should be expanded to cover all possible use cases.\n\nOffering contextual and risk-based authentication capabilities through high-assurance FIDO2 devices, as well as Push and pattern-based authentication, SafeNet Trusted Access allows you to expand secure access to any app and all users by enabling users to authenticate anywhere, whatever their circumstances.\n\nEach time a user logs into a cloud application, SafeNet Trusted Access validates the user’s identity, assesses which access policy should be enforced, and applies the appropriate level of authentication with Smart Single Sign-On.\n\nSafeNet Trusted Access offers many benefits to organizations seeking to migrate to the cloud simply and securely.\n\nPrevents data breaches by applying different MFA methods, including phishing-resistant FIDO devices and access controls, based on the environment risk assessment while eliminating passwords.\n\nSmooth integration and support for existing IAM schemes ensures you can secure cloud transformation without having to rip and replace your existing authentication schemes. \n\nClose security gaps in your environment by applying the right type and method of authentication to all your users depending on their context.\n\nSimplify compliance with real-time auditing of who is accessing which app and how.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/12d60786-5a1b-40c9-8f3b-5634e62030b5.png","url":"https://www.softwareadvice.ie/software/446053/safenet-trusted-access","@type":"ListItem"},{"name":"EmpowerID","position":18,"description":"EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing and other sectors to securely access cloud and on-premise applications. Professionals can automatically create, manage or delete user groups and configure Policy-Based Access Controls (PBAC) for staff members.\n\nKey features of EmpowerID include single sign-on (SSO), multi-factor authentication (MFA), role mining and lifecycle management. Its cloud directory supports Remote Authentication Dial-In User Service (RADIUS) and Lightweight Directory Access Protocol (LDAP) among other authentication options. Additionally, it helps users reset their passwords using a self-service platform.\n\nEmpowerID offers mobile applications for iOS and Android devices, enabling professionals to approve login requests, view, edit, rename or delete accounts, scan third-party QR codes and more. The product is available on monthly or annual subscriptions and support is extended via phone, email, video tutorials and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c076002-a8d6-48e4-af81-4e502b7db592.png","url":"https://www.softwareadvice.ie/software/366337/empowerid","@type":"ListItem"},{"name":"Crowd","position":19,"description":"Crowd is an Enterprise-grade single sign-on and identity management solution for Atlassian users. Use Crowd to manage user accounts from multiple directories, including Microsoft Azure AD, LDAP and Active Directory, in a centralized location.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3aa2c9c0-53e4-443a-a66d-be5fa808a7dd.jpeg","url":"https://www.softwareadvice.ie/software/357550/crowd","@type":"ListItem"},{"name":"TrustLogin","position":20,"description":"TrustLogin is a cloud-based solution that allows users to sign in to multiple cloud services using a single set of login credentials, eliminating the need for multiple usernames and passwords. This makes it easier for users to access their applications and improves security by reducing the risk of password-related security breaches.\n\nTrustLogin provides a centralized console for managing user identities and passwords across multiple cloud services. This allows administrators to easily add or remove users, reset passwords, and monitor user activity from a single location.\n\nTrustLogin also offers multi-factor authentication (MFA) capabilities, which add an extra layer of security to the login process. Users can authenticate using a variety of methods, including SMS, email, and mobile apps.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3743eaf5-eeda-433a-a9fb-2e345e098750.png","url":"https://www.softwareadvice.ie/software/393969/trustlogin","@type":"ListItem"},{"name":"Virtual Desktops","position":21,"description":"ComputerVault Virtual Desktops are an on-premises virtual desktop infrastructure (VDI) solution that provides users with a secure, scalable, and accessible computing environment. It allows organizations to centralize their desktop environment and applications on secure servers, making it easier to manage, secure, and scale their IT infrastructure. With ComputerVault Virtual Desktops, employees can access their desktop environment and applications from any device with an internet connection. This means that employees can work remotely, access their desktop environment and applications from home or while on-the-go, improving productivity and flexibility.\n\nComputerVault Virtual Desktops offers enhanced security features, including multi-factor authentication, encryption, and network segmentation, to help protect against cyber threats and data breaches. The virtual desktops are hosted on secure servers in data centers that comply with industry standards for security, reliability, and performance. In addition, ComputerVault Virtual Desktops provides regular software updates and patches to ensure that the environment is always up-to-date and secure.\n\nScalability is another key feature of ComputerVault Virtual Desktops. Organizations can easily scale up or down based on their business needs, without having to worry about hardware limitations or infrastructure constraints. This means that organizations can easily add or remove users, adjust computing resources, and manage their IT infrastructure more efficiently.\n\nAccessibility is another major benefit of ComputerVault Virtual Desktops. Employees can access their desktop environment and applications from any device, anywhere in the world, as long as they have an internet connection. This makes it easier for organizations to support remote work, improve employee productivity, and provide a better user experience.\n\nOverall, ComputerVault Virtual Desktops offers a flexible, secure, and cost-effective way for organizations to provide their employees with access to their desktop environment and applications, from anywhere in the world. It allows organizations to centralize their IT infrastructure, improve security, scalability, and accessibility, and increase productivity and flexibility for their employees.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/86ffcae4-c1f3-44d3-b01d-0a2c0a2dedcf.jpeg","url":"https://www.softwareadvice.ie/software/403441/virtual-desktops","@type":"ListItem"},{"name":"Cyberelements","position":22,"description":"Designed for businesses of all sizes, Cyberelements is a cloud-based access management solution that helps analyze user behavior, enable multi-factor authentication, and detect suspicious activities. The platform lets administrators track and monitor various assets such as password vaults, videos, and more.\n\nThe tool allows executives to manage employees' identity information, gain insights into users' actions, detect changes in assets in real-time, and more. Key features include configurable workflow, third-party integrations, access controls/permissions, and workflow management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/90072e8d-8875-40ea-b7bf-f441b76860cc.jpeg","url":"https://www.softwareadvice.ie/software/419007/cyberelements","@type":"ListItem"},{"name":"Jira Oauth","position":23,"description":"Jira OAuth is a cloud-based platform that enables OAuth/OpenID Single Sign On (SSO) for Jira Software and Jira Service Desk. It is compatible with all OAuth/OpenID providers such as Google, Facebook, and more, allowing users from those providers to log in and register to Jira. The app provides a step-by-step guide to configure SSO between Jira and the OAuth/OpenID provider. User profile attributes like first name, last name, and email can be mapped from the OAuth/OpenID provider to Jira.\n\nAdditionally, it also allows user groups to be mapped, adding users to the appropriate Jira groups based on their group membership in the OAuth/OpenID provider. The platform also facilitates integration with other miniOrange apps such as Two Factor Authentication, SCIM Provisioning and API Token Authentication to provide an enhanced and secure Jira experience. Pricing is based on annual subscriptions and support is extended via chat, email, FAQs, phone and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/43149dfb-590c-4cb2-b09c-546864c52553.jpeg","url":"https://www.softwareadvice.ie/software/371327/jira-oauth","@type":"ListItem"},{"name":"Systancia Access","position":24,"description":"Systancia Access is an access management, user authentication, and authentication (Single Sign On) solution that provides secure and centralized management of credentials as well as enhances user authentication through Multi-Factor Authentication (MFA). It provides users with access experience and offers auditing and reporting features to meet legal and regulatory obligations, depending on the industry. \n\nSystancia Access also drives performance to the management of authentication resources, with solutions for application enrolment, enrolment of authentication devices (cards, keys, etc.), and a self-service portal for users who can unlock themselves, reducing the need to contact the organization's help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a56713da-b837-4a53-84b2-47d452690101.png","url":"https://www.softwareadvice.ie/software/421508/systancia-access","@type":"ListItem"},{"name":"PropelAuth","position":25,"description":"PropelAuth is a cloud-based identity and access management solution for software applications catering to software companies and developers building internal tools, customer portals, and partner integrations.\n\nPropelAuth offers key features like configurable roles and permissions, SAML and SCIM integration, full user management, and API key creation. Software teams can use PropelAuth to set up granular role-based access control, connect to identity providers via SAML, automate user provisioning with SCIM, create and manage users, and generate API keys for service accounts.\n\nPropelAuth’s pricing is based on the number of users, with volume discounts available for larger organizations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a144daa9-3153-472c-b506-244cea39c73a.jpeg","url":"https://www.softwareadvice.ie/software/401463/propelauth","@type":"ListItem"}],"numberOfItems":25}
</script>
