---
description: Discover the best Customer Identity and Access Management (CIAM) Software in Ireland. Compare top Customer Identity and Access Management (CIAM) Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Customer Identity and Access Management (CIAM) Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.ie/directory/4427/ciam/software)

# Customer Identity and Access Management (CIAM) Software

Canonical: https://www.softwareadvice.ie/directory/4427/ciam/software

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.ie/directory/4427/ciam/software?page=2)

-----

## Products

1. [FusionAuth](https://www.softwareadvice.ie/software/148228/fusionauth) — 4.8/5 (30 reviews) — FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challe...
2. [Rippling](https://www.softwareadvice.ie/software/410674/rippling) — 4.9/5 (4614 reviews) — Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operatio...
3. [Okta](https://www.softwareadvice.ie/software/419181/okta) — 4.7/5 (930 reviews) — Okta is a workforce identity management platform designed to provide centralized access control and user administrati...
4. [Cisco Duo](https://www.softwareadvice.ie/software/430527/duo-security) — 4.7/5 (548 reviews) — Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any use...
5. [Iru](https://www.softwareadvice.ie/software/71745/Iru) — 4.9/5 (477 reviews) — Iru is the AI-powered IT \&amp; security platform used by the world's fastest-growing companies to secure their users,...
6. [Auth0](https://www.softwareadvice.ie/software/107607/auth0) — 4.7/5 (137 reviews) — Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any applicati...
7. [OneLogin](https://www.softwareadvice.ie/software/143308/onelogin) — 4.6/5 (92 reviews) — OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web ...
8. [ManageEngine ADManager Plus](https://www.softwareadvice.ie/software/361323/manageengine-admanager-plus) — 4.5/5 (83 reviews) — ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD managem...
9. [Sumsub](https://www.softwareadvice.ie/software/84225/sumsub-kycaml-platform) — 4.7/5 (70 reviews) — Sumsub is an all-in-one technical and legal toolkit for KYC/AML needs. The company provides a web-based platform for ...
10. [Admin By Request](https://www.softwareadvice.ie/software/418541/admin-by-request) — 4.9/5 (68 reviews) — Admin By Request is a cybersecurity solution designed to make comprehensive security simple. Our main goal is to enab...
11. [Microsoft Entra ID](https://www.softwareadvice.ie/software/399665/azure-active-directory) — 4.7/5 (55 reviews) — Azure Active Directory, part of Microsoft Entra, is an identity and access management (IAM) solution that offers mult...
12. [Twilio User Authentication & Identity](https://www.softwareadvice.ie/software/390536/twilio-user-authentication-and-identity) — 4.8/5 (52 reviews) — Twilio User Authentication \&amp; Identity offers digital identity verification and intelligence tools to build mutual...
13. [Conecta Suite](https://www.softwareadvice.ie/software/366554/conecta-suite) — 4.9/5 (47 reviews) — Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team pr...
14. [Ping Identity](https://www.softwareadvice.ie/software/150649/pingidentity) — 4.7/5 (39 reviews) — At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise...
15. [Advanced Entry](https://www.softwareadvice.ie/software/339271/advanced-entry) — 4.7/5 (38 reviews) — Advanced Entry fully contactless sign-in Kiosk includes an automatic 'Temperature-reader' with 'Face recognition, as ...
16. [miniOrange](https://www.softwareadvice.ie/software/342508/single-sign-on) — 4.5/5 (36 reviews) — The simplest platform which integrates thousands of applications with convenient features such as SSO, MFA, Provision...
17. [SAP Access Control](https://www.softwareadvice.ie/software/233830/sap-access-control) — 4.5/5 (32 reviews) — SAP Access Control is an access management software designed to help businesses across various industry verticals, in...
18. [WSO2 Identity Server](https://www.softwareadvice.ie/software/298462/wso2-identity-server) — 4.3/5 (32 reviews) — WSO2 Identity Server, part of WSO2’s CIAM suite, is the market’s leading open-source CIAM solution. It provides moder...
19. [Entrust IDV](https://www.softwareadvice.ie/software/373854/onfido) — 4.6/5 (30 reviews) — Onfido, an Entrust company, helps businesses to build identity verification around their unique needs with an end-to-...
20. [Secomea](https://www.softwareadvice.ie/software/440313/secomea) — 4.7/5 (19 reviews) — Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It i...
21. [LoginRadius](https://www.softwareadvice.ie/software/141097/loginradius) — 3.8/5 (13 reviews) — LoginRadius is a cloud-based customer identity and access management solution for businesses in industries such as me...
22. [Frontegg](https://www.softwareadvice.ie/software/240850/frontegg) — 4.8/5 (12 reviews) — A user management platform available only in English, Frontegg was built for B2B, B2C, and SaaS product developers wh...
23. [Token of Trust](https://www.softwareadvice.ie/software/371497/token-of-trust) — 4.5/5 (11 reviews) — Token of Trust is a cloud-based customer identity and access management (CIAM) software that helps businesses in educ...
24. [ComplyCube](https://www.softwareadvice.ie/software/391073/complycube) — 5.0/5 (10 reviews) — ComplyCube is a solution for any business looking to comply with identity verification, anti-money laundering (AML), ...
25. [Zygon](https://www.softwareadvice.ie/software/523084/Zygon) — 5.0/5 (10 reviews) — Zygon is an all-in-one platform that automates the management of applications and accounts for modern IT and security...

-----

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.ie/directory/4427/ciam/software?page=2)

## Related Categories

- [Visitor Management Software](https://www.softwareadvice.ie/directory/4205/visitor-management/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.ie/directory/4311/authentication/software)
- [Access Governance Software](https://www.softwareadvice.ie/directory/4665/access-governance/software)
- [Single Sign On Software](https://www.softwareadvice.ie/directory/4347/single-sign-on/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4427/ciam/software)
- [All Categories](https://www.softwareadvice.ie/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4427/ciam/software> |
| en | <https://www.softwareadvice.com/ciam/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4427/ciam/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4427/ciam/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4427/ciam/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4427/ciam/software> |
| fr | <https://www.softwareadvice.fr/directory/4427/ciam/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.ie/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@type":"WebSite","@id":"https://www.softwareadvice.ie/#website","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Customer Identity and Access Management (CIAM) Software","description":"Discover the best Customer Identity and Access Management (CIAM) Software in Ireland. Compare top Customer Identity and Access Management (CIAM) Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4427/ciam/software","about":{"@id":"https://www.softwareadvice.ie/directory/4427/ciam/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4427/ciam/software#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.ie/directory/4427/ciam/software#webpage","mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4427/ciam/software#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Customer Identity and Access Management (CIAM) Software","position":2,"item":"https://www.softwareadvice.ie/directory/4427/ciam/software","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4427/ciam/software#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Best Customer Identity and Access Management (CIAM) Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"FusionAuth","position":1,"description":"FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challenges of security, scalability, and developer efficiency. This solution is designed for organizations seeking to enhance their identity management processes while ensuring compliance with stringent regulatory standards such as GDPR and SOC2. By offering a flexible deployment model, FusionAuth allows users to maintain control over their data residency, whether in the cloud, on-premises, or in hybrid environments.\n\nTargeted towards developers and organizations that require robust identity solutions, FusionAuth is particularly beneficial for businesses experiencing rapid growth or those that need to streamline their authentication processes. Its API-first architecture enables organizations to embed identity management directly into their existing workflows, reducing the operational burden associated with traditional identity providers. This capability is especially valuable for companies that wish to eliminate the complexities and costs associated with maintaining homegrown authentication systems.\n\nKey features of FusionAuth include its flexible deployment options, which empower organizations to choose how and where they host their identity management solution. This flexibility is complemented by an API-driven architecture, where every feature is accessible through APIs, allowing for seamless integration and management of identity as part of the overall infrastructure. This approach not only enhances developer velocity but also ensures that organizations can adapt their identity solutions to meet evolving business needs without being locked into a single vendor's cloud.\n\nAdditionally, FusionAuth offers predictable pricing models that help organizations avoid unexpected costs commonly associated with monthly active user (MAU) surges. This transparency in pricing is a significant advantage for businesses looking to scale without incurring excessive expenses. The platform has demonstrated its effectiveness across various industries, with notable success stories highlighting its ability to handle massive traffic surges, reduce operational bottlenecks, and lower engineering burdens.\n\nFor instance, Bilt leveraged FusionAuth to manage high traffic volumes while ensuring compliance with data residency requirements. Similarly, Vatix transitioned from a cumbersome homegrown system to FusionAuth, enabling their Customer Success team to onboard clients quickly and efficiently. UrbanSitter's implementation of FusionAuth significantly reduced their authentication development time, allowing them to focus on core product innovation. These examples illustrate how FusionAuth not only enhances security and compliance but also drives operational efficiency and cost savings for organizations across diverse sectors.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c9a84fb-bd66-457c-b4c3-e15a64673820.png","url":"https://www.softwareadvice.ie/software/148228/fusionauth","@type":"ListItem"},{"name":"Rippling","position":2,"description":"Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operations. It centralizes employee data and automates tasks, offering features such as workflow studio for automation, reporting analytics, automated policies, and permissions management. Rippling provides specialized suites for various needs: Rippling HR manages the employee lifecycle, Rippling Payroll automates payments and direct deposits, IT tools enhance IT security with identity and device management, and the Finance suite integrates corporate cards, expenses, and accounts payable automatically. It also supports global compliance for onboarding and management across countries. Rippling is an all-in-one platform that offers a wide range of features to streamline HR operations, enhance security measures, automate payroll processes and control company costs. With its focus on scalability, security, automation and cost management, Rippling empowers businesses to optimize their workforce operations, reduce risks and achieve operational efficiency across their organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7ec57690-a46d-4978-83cf-a6f85c097649.png","url":"https://www.softwareadvice.ie/software/410674/rippling","@type":"ListItem"},{"name":"Okta","position":3,"description":"Okta is a workforce identity management platform designed to provide centralized access control and user administration for employees and work partners. It supports organizations in securing their workforce while managing access to various business applications and systems.\n\nThe platform includes features such as pre-built integrations to connect with existing business technologies. It offers centralized management of users, groups, and devices through a single interface. Automated onboarding and offboarding capabilities enable administrators to efficiently manage user access with minimal manual effort.\n\nOkta is used by organizations across different industries for identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37d97abb-49dc-4a9f-a027-0925c44e3c6b.png","url":"https://www.softwareadvice.ie/software/419181/okta","@type":"ListItem"},{"name":"Cisco Duo","position":4,"description":"Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem.  \n\nDuo verifies users' identities and establishes device trust in any IT and security environment: \n\n- Multi-cloud, hybrid, and on-premises application support \n\n- Diverse mix of operating systems and deep integrations with leading technology providers \n\n- Unique use cases including supporting homegrown and legacy apps, securing third-party devices, and protecting Winlogon and RDP \n\nPaired with deep insights into users’ devices, Duo gives you the policies and control to manage access based on endpoint health or user risk level which can change between authentication attempts. By providing simple, seamless end user and administrator experiences, Duo dramatically reduces your total cost of ownership. \n\nDuo Continuous Identity Security combines Cisco Identity Intelligence with Duo Passport to stop identity-based threats and boost workforce productivity. Cisco Identity Intelligence provides visibility across your identity sources into multi-factor authentication (MFA) usage, admin controls, unmanaged device access, inactive or dormant accounts, excessive permissions, and more.  Duo Passport eliminates MFA fatigue by minimizing authentication requests and friction in trusted scenarios throughout the workday. After login, Duo continually evaluates trust for every access request and doesn’t prompt users again for authentication if the context remains the same. \n\nPrior to granting access to critical resources, Duo verifies users’ identities with strong MFA. Duo passwordless and single sign-on (SSO) build on MFA to verify user identity with authentication tools like biometrics, FIDO2 security keys, and push notifications from the Duo Mobile app. \n\nWhile establishing user trust is essential, you also need to have trust in the devices accessing applications on your network. Duo’s device trust tools deliver visibility into devices, assess their security posture, and continuously verify trust to allow or block access. \n\n- Duo Device Insight inventories every endpoint and provides data on OS, platform, browser and plugin versions, including passcode, screen lock, full disk encryption, and rooted/jailbroken status. Easily search, filter, and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest vulnerabilities. \n\n- Duo Desktop, a native client app for macOS, Windows, and ChromeOS, enables you to enforce corporate device health policies such as checking OS version and patch level, password and firewall status, AV agent enabled, disk encryption, and management status.  \n\n- Self-remediation enables you to block non-compliant devices at the point of authentication and empower users to bring devices back into compliance without contacting IT. Automatically notify users of outdated devices with direct links to update to the latest software version. Provide a grace period before application access is blocked, or block immediately with permissions reinstated once the device has been updated.  \n\n- Duo Trusted Endpoints helps you define and manage trust for every endpoint, whether managed or unmanaged, company-issued, contractor-owned, or personal Bring-Your-Own-Device (BYOD). Create your own inventory of trusted devices with the option to add and remove devices, include a description, set a trust expiration date, and more.  \n\nDuo bundles basic support with every subscription purchase. Duo Quick Start provides 60 days of expert advice from our trusted deployment advisors. With Duo Care, our premium support service, you'll work with a team of Duo experts who will guide you through the life of your subscription to help you maximize the value of your Duo investment as your organization and business needs evolves.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1c054704-dda9-4998-a805-b9fa3169766b.png","url":"https://www.softwareadvice.ie/software/430527/duo-security","@type":"ListItem"},{"name":"Iru","position":5,"description":"Iru is the AI-powered IT & security platform used by the world's fastest-growing companies to secure their users, apps, and devices. Built for the AI era, Iru unifies identity & access, endpoint security & management, and compliance automation—collapsing the stack and giving IT & Security teams time and control back.\n\nThe Problem\nIT & Security teams today juggle dozens of point solutions with separate consoles and data silos. There's no shared context or single view, so work slows and risk grows. Nearly half of teams cite overlapping tools as their top challenge. The stack is the problem.\n\nIru collapses the stack by bringing together the capabilities every business relies on. When they live in one place, they inform each other, and everything works better.\n\nAt the core is the Iru Context Model—a living map of your environment. On top of it sits Iru AI, which transforms complex data into clear, strategic insights and enables all products to inform and improve each other.\n\nThe Platform\nIru gives you a single view of your users, apps, and devices through six integrated products:\n- Workforce Identity delivers passwordless single sign-on with device-bound passkeys, context-aware access to every app, and automated user lifecycle management.\n- Endpoint Management provides advanced automation to onboard users, update apps, and enforce policies across Apple, Windows, and Android—all with a single lightweight endpoint agent.\n- Endpoint Detection & Response stops advanced and emerging threats with machine learning-enhanced detections, autonomous containment, and remediation in real time across Mac and Windows.\n- Vulnerability Management gives full visibility into software risk on Mac and Windows with autonomous response to patch vulnerable software, prioritized by Iru AI.\n- Compliance Automation is AI-native—transforming frameworks into tailored controls, breaking them into tasks, and mapping evidence automatically to keep you audit-ready.\"\n- Trust Center provides a public portal to share certifications, reports, and security posture to accelerate deals, with security questionnaires answered by Iru AI.\n\nBuilt for the AI Era\nIru AI is designed from the ground up to connect agents across identity, endpoints, and compliance. Powered by the Iru Context Model, it understands your users, devices, and apps to act safely, intelligently, and in context across your organization. This gives IT & Security teams time and control back.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fbc7072f-654f-49f7-9fc8-6ae0b6bb3b84.png","url":"https://www.softwareadvice.ie/software/71745/Iru","@type":"ListItem"},{"name":"Auth0","position":6,"description":"Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is a highly customizable product that is as simple as development teams want, and as flexible as they need. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1727a37-7505-40cf-896e-edf3a2a4583e.png","url":"https://www.softwareadvice.ie/software/107607/auth0","@type":"ListItem"},{"name":"OneLogin","position":7,"description":"OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web applications, data centers, cloud storage and more. Key features include single sign-on, web access management, adaptive and multi-factor authentication and mobile identity tracking.\n\n\nOneLogin’s web access management tool integrates with the existing web servers and helps businesses secure their web applications. Its adaptive authentication feature uses machine learning to determine the kind of security access that users need to fill in order to access the system. The solution uses a multi-factor authentication system that validates users’ identity through standard user ID and passwords along with one-time passwords (OTP) shared via mobile app and text messages, Duo Security, RSA and more.\n\n\nOneLogin is available on a per user per month subscription basis. Support is offered via phone, email and an online knowledge repository. The solution is used in a variety of businesses including education, energy, manufacturing, government, finance and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/920aaefd-244a-4931-8332-43973d59fe68.png","url":"https://www.softwareadvice.ie/software/143308/onelogin","@type":"ListItem"},{"name":"ManageEngine ADManager Plus","position":8,"description":"ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD management and reporting tasks with ease. Its all-inclusive reports for diverse AD functionalities play a vital role in data-driven decision-making. ADManager Plus also has risk assessment indicators that monitor your organization's AD environment for potential risks, risk exposure management to view potential attack paths that could leave your privileged entities vulnerable, and access certification campaigns to review user access regularly.\nIt seamlessly integrates with leading ITSM, SIEM, and HCM solutions and other third-party applications using custom APIs to enhance the scalability of IT resource management, improve the efficiency of administrative tasks, and provide consistency while handling enterprise data.\nADManager Plus offers the option to back up your data and restore it when required, preventing data loss.\nIts core features include:\n\nUser provisioning\nManage user identities and access privileges throughout the user's life span in an organization. Create accounts in AD, Microsoft 365, and Google Workspace and carry out other management tasks like password resets, account unlocks, and template-based account updates.\n\nRisk assessment\nIdentify potential security risks of your AD using a risk score indicator. Prompt decisions based on it can help mitigate the identified risks and take the security of the organization up a notch.\n\nRisk exposure management\nVisualize potential attack paths that hackers could exploit to gain access to your AD privileged entities and view required remediation measures to secure them.\n\nAccess certification campaign\nReview the user privileges using periodic audit campaigns to ensure their access is authorized and appropriate. This helps your organization follow the principle of least privilege so that admins can have better control of user access.\n\nReport management\nADManager Plus offers more than 200 prepackaged reports on objects such as users, computers, groups, OUs, and more, plus custom reports with advanced filters, ensuring admins have crucial information at their fingertips. They can carry out tasks by utilizing the in-line management actions available in the report.\n\nWorkflow\nAdmins can define workflow agents like requester, reviewer, approver and executor for every AD management action performed using ADManager Plus. Configure SLAs to ensure the timely execution of tasks by sending frequent notifications, changing priority, and reassigning requests.\n\nDelegation\nEquip non-admin users to execute routine AD administrative tasks by assigning them custom help desk roles, balancing the workload of IT admins.\n\nAutomation\nEliminate manual AD tasks by automating them to be executed at specified time intervals. For critical tasks, implement a business workflow so that the automation is supervised.\n\nOrchestration\nPerform event-driven management actions using predefined templates. Integrate HCM applications with ADManager Plus to activate bidirectional data sync between HCM applications and AD using webhooks.\n\nIntegration\nIntegrate with third-party applications using REST APIs and webhooks. Various ITSM, SIEM, and HCM tools can be integrated with ADManager Plus for centralized management and meeting compliance audit needs.\n\nBackup and recovery\nPrevent and manage data loss by periodically backing up AD, Google Workspace, and Microsoft Entra ID and recovering it when required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/28958cda-088c-4757-b48b-8054d0ef96d9.png","url":"https://www.softwareadvice.ie/software/361323/manageengine-admanager-plus","@type":"ListItem"},{"name":"Sumsub","position":9,"description":"Sumsub is an all-in-one technical and legal toolkit for KYC/AML needs. The company provides a web-based platform for converting customers, speeding up verification, reducing costs and detecting digital fraud. Sumsub’s global clientele, based in over 200 different jurisdictions are able to meet financial requirements including FCA, CySec, MAS, FINMA, BAFIN, etc. and expand to new regions with the help of technology and legal support.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ac267195-2b75-41f3-bc79-13fddb094432.png","url":"https://www.softwareadvice.ie/software/84225/sumsub-kycaml-platform","@type":"ListItem"},{"name":"Admin By Request","position":10,"description":"Admin By Request is a cybersecurity solution designed to make comprehensive security simple. Our main goal is to enable enterprises to lock down administrative privileges across all endpoints by revoking local admin rights - while still providing means for end users to gain elevated privileges when they need it.\n\nOnce local admin rights are removed based on user or group, end users are still able to gain elevated privileges when they need it via the self-service endpoint application.\n\nPrivileges can be elevated per app (single app elevation), or for a set period of time (session elevation). All elevated activity undertaken by the user while they have elevated privileges is logged in the Admin By Request Auditlog, which can be accessed via a user-friendly online Admin Portal.\n\nAlso accessible from the Admin Portal is a full hardware and software Inventory, customizable reports, features such as Break Glass (a LAPS-replacement feature for creating emergency local admin accounts), Device Owner, and Clean Up Local Admins, as well as all Settings and Sub-Settings, which allow organizations to create granular access control rules to tailor the software to their specific needs.\n\nFile downloads are scanned by over 35 anti-malware engines which comprise OPSWAT's MetaDefender Cloud API, and flagged if malware is detected.\n\nIntegration with ServiceNow, Slack, Teams, Intune, SIEM tools, and a number of other popular software, make adoption of Admin By Request  effortless for end users and administrators.\n\nEnd users can remain productive, Help Desk personnel can focus on more important tasks, and company compliance requirements can be met with a single security tool.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/458d0ba4-5f9a-47b7-85c7-36844921bbc4.jpeg","url":"https://www.softwareadvice.ie/software/418541/admin-by-request","@type":"ListItem"},{"name":"Microsoft Entra ID","position":11,"description":"Azure Active Directory, part of Microsoft Entra, is an identity and access management (IAM) solution that offers multi-factor authentication and single sign-on (SSO) capabilities to prevent cyberattacks. It enables managers to automate workflows, track employees’ productivity, conduct behavioral analysis, and monitor user activities via a unified platform.\n\nCustomers can use their local account, enterprise, or social media identities to request access to business applications. It provides a host of features such as user management, analytics, access control, security management and more. Additionally, Azure Active Directory allows administrators to manage user credentials, define access control policies and track the user journey.\n\nAzure Active Directory comes with an application programming interface (API), which facilitates integration with several third-party platforms such as Office 365, Workplace, myday, Box, SAP Concur, Canvas and more. Pricing is available on a monthly subscription and support is extended via phone, email, FAQs, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/16318bac-773a-41ed-be59-32d9f482143a.png","url":"https://www.softwareadvice.ie/software/399665/azure-active-directory","@type":"ListItem"},{"name":"Twilio User Authentication & Identity","position":12,"description":"Twilio User Authentication & Identity offers digital identity verification and intelligence tools to build mutual trust between business and consumer.\n\nVerify end-users are who they say they are across SMS, email, WhatsApp, TOTP, Push Verification and more with Twilio Verify, a single API for multichannel verification. \n\nThe Lookup API provides in-depth information behind a phone number to power trusted interactions with phone number formatting, line type, and SIM swap and call forwarding detection, and more..","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/53c202f2-2f21-4f47-9ecf-f3bc55f4d731.jpeg","url":"https://www.softwareadvice.ie/software/390536/twilio-user-authentication-and-identity","@type":"ListItem"},{"name":"Conecta Suite","position":13,"description":"Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.\nBy integrating Conecta Suite, you enhance the use of the Admin Console with increased security and detailed resource management, allowing your team to collaborate and communicate more smoothly and securely.\nConecta Suite not only optimizes productivity but also strengthens security, safeguarding your data against threats and unauthorized access. Key features include:\n✅ Automatic email signature reapplication;\n✅ Access restrictions by time, system, browser, and IP;\n✅ Custom shift scheduling;\n✅ Automatic or manual device disconnection;\n✅ Deactivation of licenses for former employees;\n✅ Detailed reports on logins and file sharing;\n✅ Custom login screen with company branding;\n✅ Email and Drive file migration between users","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6430a9a4-eb31-4865-a5cb-12699bdde077.png","url":"https://www.softwareadvice.ie/software/366554/conecta-suite","@type":"ListItem"},{"name":"Ping Identity","position":14,"description":"At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. We champion every identity. \n\nHow do we do it? Through a no-code, drag-and-drop canvas that allows enterprises of all sizes to orchestrate and iterate their identity flows. From designing user experiences to automating identity workflows to methodically migrating users from different data stores, our orchestration tool allows anyone to design flows that integrate all your chosen identity vendors.\n\nIdentity has traditionally been a highly specialized skill set but now requires input from technical and non-technical audiences. Ping’s orchestration solution unleashes the potential of identity by enabling people at various levels to create, test, optimize and deploy user experiences through no-code integrations and flows.\n\n\t•\tIntegrate new products and services with speed and precision\n\t•\tStreamline multi-vendor architectures without custom coding\n\t•\tExplore new ways to engage users and optimize workflows with minimal disruption\n\nPing offers hundreds of integration kits, connectors, and productized flows to easily deploy the following capabilities:\n\t•\tIdentity Verification\n\t•\tCredential Issuance\n\t•\tProfile Management\n\t•\tSingle Sign-On / Authentication\n\t•\tMulti-Factor Authentication\n\t•\tAuthorization\n\t•\tThreat Insights\n\nWith Ping Identity’s PingOne Cloud platform, you can have your choice of multiple deployment options, no matter where you are on your cloud migration or digital transformation journey. We offer solutions that work across hybrid, multi-cloud, multi-generational, cloud-first, or completely on-premise environments.\n\nWe serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/026a740e-5e5f-480b-94d5-19e12e157521.png","url":"https://www.softwareadvice.ie/software/150649/pingidentity","@type":"ListItem"},{"name":"Advanced Entry","position":15,"description":"Advanced Entry fully contactless sign-in Kiosk includes an automatic 'Temperature-reader' with 'Face recognition, as well as a customizable CDC questionnaire, badge printing, marketing tools, and much more. We service any healthcare facility that would like to ease the front desk labor.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3874e2cc-fd10-42b9-80c6-c73617eb32b7.png","url":"https://www.softwareadvice.ie/software/339271/advanced-entry","@type":"ListItem"},{"name":"miniOrange","position":16,"description":"The simplest platform which integrates thousands of applications with convenient features such as SSO, MFA, Provisioning, etc. with any user source - AD, Azure AD, Okta, miniOrange.\n\nThe product offers comprehensive features such as Single-Sign-On, Multi-Factor Authentication, User Provisioning, Identity & Cross-Protocol Brokering, etc.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4accf338-6e3b-4e2a-bda6-3039afcf2f22.png","url":"https://www.softwareadvice.ie/software/342508/single-sign-on","@type":"ListItem"},{"name":"SAP Access Control","position":17,"description":"SAP Access Control is an access management software designed to help businesses across various industry verticals, including banking, financial services, energy and natural resources, professional services, automotive, healthcare, retail, agribusiness and more. Key features include access request, custom user groups, access control, access risk analysis and remediation. \n\nTeams using SAP Access Control can analyze risk through predefined rule sets and streamline the performance of cross-system analysis across enterprise applications in real-time or in offline mode. Administrators can manage access using automated access requests, embedded simulations and automated provisioning to various applications. Additionally, organizations can certify assignment and role content to team members and review role and user transaction details. \n\nSAP Access Control integrates with SAP Cloud Identity Access Governance, SAP SuccessFactors, SAP Process Control, SAP HANA DB, SAP S/4HANA On-Premise and other third-party applications. Support is extended via phone, email, documentation and FAQs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f555dc8-971f-4c54-92f4-93754c4b86d2.png","url":"https://www.softwareadvice.ie/software/233830/sap-access-control","@type":"ListItem"},{"name":"WSO2 Identity Server","position":18,"description":"WSO2 Identity Server, part of WSO2’s CIAM suite, is the market’s leading open-source CIAM solution. It provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) applications, or even deployed to fulfill workforce IAM requirements. \n\nDesigned for developers, by developers, WSO2 Identity Server offers an open, API-driven architecture alongside a broad set of developer tools. Its impressive extensibility, scalability, and dedicated community make it the ideal choice for your identity development needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae41b619-05bb-4795-a513-6fa4c105a6e4.png","url":"https://www.softwareadvice.ie/software/298462/wso2-identity-server","@type":"ListItem"},{"name":"Entrust IDV","position":19,"description":"Onfido, an Entrust company, helps businesses to build identity verification around their unique needs with an end-to-end, AI powered identity verification solution.\n\nWe partner with 1,200+ businesses to seamlessly onboard customers at scale while stopping fraud and navigating KYC, AML and other regulatory requirements.\n\nThe Real Identity Platform contains:\n\nVerification Suite. A comprehensive library of verifications – including award-winning document and biometric solutions, trusted data sources, and passive fraud signals.\n\nOnfido Studio. A powerful workflow builder that enables businesses to tailor identity verification workflows to meet their unique market and risk requirements, all in a drag-and-drop interface.\n\nAtlas AI. Proprietary AI built over 10 years by hundreds of researches and engineers. It's how we make our analysis fair, fast, and accurate.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8fe1d07f-bc83-4ec8-9a8b-f5c7b78fb2b9.png","url":"https://www.softwareadvice.ie/software/373854/onfido","@type":"ListItem"},{"name":"Secomea","position":20,"description":"Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It is utilized by nearly ten thousand customers worldwide across numerous sites, enabling them to remotely manage their machines and prevent downtime.\n\nSecomea's solution integrates with any OT equipment, allowing organizations to secure their cyber-physical systems. This enables technicians to remotely access and intervene in production facilities, reducing travel expenses, response time, and security risks.\n\nThe implementation of Secomea's solution typically requires just one day per site. With a user-friendly and intuitive interface, Secomea aims to simplify secure remote access while maintaining global oversight and local control.\n\nSecomea's features:\n\nIdentity and access management features:\n\n- Privileged access management: Set up hierarchy-based user roles based on the principle of least privilege\n- Granular access control: Control access on an individual level with granular permissions\n- Advanced grouping: Perform mass administration of user permissions\n- Just-in-time (JIT) access: Grant temporary or scheduled access to specific assets\n- Always-on access: Set up a static, persistent tunnel connection between two separate networks\n- Request for access: Users can request access to specific assets, and admins can approve it in one click\n- Multi-Factor Authentication (MFA): Verify users’ identities via MFA with SMS authentication\n- Single Sign-On (SSO): Secure users’ authentication via Single Sign-On (SSO) with Azure AD or Okta\n\nRemote access features:\n\n- Agentless, web-based system: Use Secomea directly from your browser – no need to install a plugin or application\n- Direct access via lightweight client: Supporting OT protocols such as Modbus, Profinet, EtherCAT, Ethernet/IP, etc.\n- Indirect and clientless access: Supporting remote access from your browser via RDP, VNC, SSH, Telnet, HTTPS\n- Secure file transfer: Scan files transferred remotely for viruses or malware to assess their safety\n\nAudit and monitoring:\n\n- Real-time activities monitoring: Get an overview of ongoing remote access sessions from the Prime Dashboard\n- Audit logs: Track every activity performed on your machines to document who did what and when\n- Session recordings: Capture videos of remote access sessions for troubleshooting and audit purposes\n- Alerts and automated actions: Get SMS/email notifications for specific events and automate triggered actions\n- Access gateways information: Get a centralized overview of all gateways with detailed info (serial number, IP, firmware, last heartbeat). Register info on their physical location and contact details for streamlined operations\n- Vulnerability hub: Spot gateways that are not running the latest firmware version and those whose models are approaching End of Life or End of Support to ensure timely updates and replacements\n\nCustomization and integrations:\n- API access: Integrate Secomea with other tools you use to run your operations\n- AD integration: Changes implemented in Microsoft Azure Active Directory are synced hourly in Secomea’s access management server.\n- Security Information and Event Management (SIEM) integration: Integrate your SIEM system (Syslog, Splunk, etc.) with Secomea\n- Data Collection Module (DCM) and cloud integration\n- Collect data from your industrial equipment using its native data collection protocols (OPC UA, Modbus TCP, Siemens S7, Ethernet/IP, MQTT, etc.) and send it to your chosen cloud solution for further processing (Microsoft Azure IoT Hub, Amazon AWS IoT Core, Software AG Cumulocity IoT, Aveva Insight, MQTT data servers, etc.)\n- Support system integration: Integrate your support system with Secomea’s to centralize ticket management\n- Branding: Customize your URL and login page to align it with your corporate brand.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4ef015ad-ad45-47d0-9bc4-3367d535d5f0.jpeg","url":"https://www.softwareadvice.ie/software/440313/secomea","@type":"ListItem"},{"name":"LoginRadius","position":21,"description":"LoginRadius is a cloud-based customer identity and access management solution for businesses in industries such as media, publishing, travel, nonprofit, e-commerce and sports. Key features include customer registration and authentication, single sign-on, customer data management and user insights management.\n\n\nLoginRadius enables users to access online portals that clients control through a mobile app, as well as through single sign-on tools. Users can also create web forms, set up custom registration pages, manage subscription signups, create contest forms and landing pages. The dashboard lets team members browse, view and manage individual customer profiles and also helps users to analyze the customer behavior journey.\n\n\nLoginRadius also offers integration with third party digital tools like Salesforce, MailChimp and Google Analytics.\n\n\nServices are offered on an annual subscription basis and support available via phone and online messaging.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c833384-fb48-4bcb-a29b-4fad58dd0bb5.jpeg","url":"https://www.softwareadvice.ie/software/141097/loginradius","@type":"ListItem"},{"name":"Frontegg","position":22,"description":"A user management platform available only in English, Frontegg was built for B2B, B2C, and SaaS product developers who use the product-led growth (PLG) methodology. Users embed 5 lines of code in their app to deploy a user management portal. It grants access for their app customers to view a dashboard of their own. With a profile management form, the software allows users to choose privacy & security settings and check usage levels. They can also set user permissions, audit logs, generate webhooks & API tokens, and connect single sign-on credentials for company-wide access. \n\nFrontegg adjusts to customer use, with data segregated by tenant in-use. The customer console lets end-users choose their subscription plan and payment options, control multi-factor authentication (MFA) & security settings, assign webhooks, generate machine-to-machine API tokens, oversee account usage, manage & invite team members, and manage corporate identity provider flows.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6650e17f-6821-4110-8a9e-54cc3e021873.png","url":"https://www.softwareadvice.ie/software/240850/frontegg","@type":"ListItem"},{"name":"Token of Trust","position":23,"description":"Token of Trust is a cloud-based customer identity and access management (CIAM) software that helps businesses in education, real estate, retail, healthcare, professional services, and other sectors verify the identity and document of customers from a unified platform. The platform helps in identity screening, capturing information, and preventing fraud. Token of Trust utilizes 256-bit SSL encryption for data security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cc9c2506-8821-44c1-8057-1b1ddf084adb.png","url":"https://www.softwareadvice.ie/software/371497/token-of-trust","@type":"ListItem"},{"name":"ComplyCube","position":24,"description":"ComplyCube is a solution for any business looking to comply with identity verification, anti-money laundering (AML), and know your customer (KYC) regulations.\n\nComplyCube enables businesses to verify customers, improving trust and streamlining compliance. The ISO-certified platform provides several integration options, including low/no-code solutions, APIs, mobile and web SDKs, client libraries, and CRM integrations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c229f677-34b0-4a40-9e0b-4788f9d65055.jpeg","url":"https://www.softwareadvice.ie/software/391073/complycube","@type":"ListItem"},{"name":"Zygon","position":25,"description":"Zygon is an all-in-one platform that automates the management of applications and accounts for modern IT and security teams. It helps organizations orchestrate IT operations with app owners, users, or bots to streamline access requests and reviews, account provisioning, and de-provisioning.\n\nThe platform provides a comprehensive inventory of all applications and accounts used within the organization, helping eliminate shadow IT and control SaaS sprawl. Zygon automates access management across all applications, whether they support SCIM or not. It also offers integrated security and compliance features, providing visibility and control over authentication methods, allowing users to configure alerting rules, and helping enforce security policies across the entire SaaS stack.\n\nZygon seamlessly integrates with popular tools such as Google Workspace, Microsoft 365, Okta, Slack, and Microsoft Teams, allowing organizations to leverage their existing user directories and workflows. The platform also offers a powerful workflow engine and API to build custom automations, as well as a user-friendly interface for employees to request access and managers to approve them.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cecf5f83-2a8f-458e-af1a-c3d966f545e6.png","url":"https://www.softwareadvice.ie/software/523084/Zygon","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4427/ciam/software#itemlist","numberOfItems":25}
</script>
