---
description: Page 5 - Discover the best Identity Management Software in Ireland. Compare top Identity Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 5 - Best Identity Management Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Identity Management Software](https://www.softwareadvice.ie/directory/4549/identity-management/software) > [Page 5](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5)

# Identity Management Software

Canonical: https://www.softwareadvice.ie/directory/4549/identity-management/software

Page: 5 / 10\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=4)\
Next: [Next page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=6)

-----

## Products

1. [GetID](https://www.softwareadvice.ie/software/118999/getid) — 4.8/5 (6 reviews) — GetID is a KYC and identity verification solution that helps businesses across finance, healthcare, banking, telecom ...
2. [NineID](https://www.softwareadvice.ie/software/428982/nineid) — 4.7/5 (6 reviews) — 9ID is a contractor compliance platform that transforms manual, fragmented contractor verification into a scalable, a...
3. [Trust Swiftly](https://www.softwareadvice.ie/software/345885/trust-swiftly) — 5.0/5 (5 reviews) — Trust Swiftly is a cloud-based identity verification platform that helps businesses verify their customers with over ...
4. [Bravura Identity](https://www.softwareadvice.ie/software/360356/Bravura-Identity) — 4.2/5 (5 reviews) — Revolutionize your digital identity program with Bravura Identity. Implement this best-in-class solution to easily en...
5. [heylogin](https://www.softwareadvice.ie/software/363921/heylogin) — 5.0/5 (5 reviews) — heylogin is the password solution for your business. A smartphone swipe instead of a master password makes your every...
6. [OpenText Identity Manager](https://www.softwareadvice.ie/software/282935/netiq-identity-manager) — 4.8/5 (5 reviews) — NetIQ Identity Manager is an identity management and access governance solution that includes features for password s...
7. [Infisign](https://www.softwareadvice.ie/software/436781/infisign) — 4.8/5 (5 reviews) — By embracing the Zero Trust philosophy, Infisign ensures a holistic approach to security by continuously verifying th...
8. [AppViewX AVX ONE CLM](https://www.softwareadvice.ie/software/419532/cert) — 5.0/5 (5 reviews) — AppViewX AVX ONE CLM is a comprehensive, automated certificate lifecycle management (CLM) solution that simplifies PK...
9. [Campus ID Solutions](https://www.softwareadvice.ie/software/354583/campus-id-solutions) — 4.4/5 (5 reviews) — Transact's Campus ID solutions offer students the convenience of using a single ID card, whether it is in a mobile, p...
10. [Entrust Identity as a Service](https://www.softwareadvice.ie/software/93746/intellitrust) — 5.0/5 (4 reviews) — Entrust Identity as a Service is a cloud-based identity and access management service that provides digital security ...
11. [meshcloud](https://www.softwareadvice.ie/software/340975/meshcloud) — 4.3/5 (4 reviews) — meshStack is built on years of experience in cloud transformation with major customers such as Volkswagen, Metro and ...
12. [SecureAuth Workforce IAM](https://www.softwareadvice.ie/software/168652/secureauth-idp) — 4.5/5 (4 reviews) — SecureAuth is a cloud-based software that helps businesses manage and verify user identities through various authenti...
13. [Uniqkey](https://www.softwareadvice.ie/software/425970/uniqkey) — 5.0/5 (4 reviews) — Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies w...
14. [Quadrant XDR](https://www.softwareadvice.ie/software/417889/sagan) — 5.0/5 (4 reviews) — Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a s...
15. [YOUZER](https://www.softwareadvice.ie/software/181348/youzer) — 4.8/5 (4 reviews) — Youzer is a web-based IT and SaaS account management solution that helps businesses automate employee offboarding and...
16. [CloudConnexa](https://www.softwareadvice.ie/software/506382/Cloud-Connexa) — 4.0/5 (4 reviews) — CloudConnexa eliminates the common complexity associated with scaling and managing network hardware, offering flexibl...
17. [System Frontier](https://www.softwareadvice.ie/software/66345/system-frontier) — 5.0/5 (3 reviews) — System Frontier is an identity management solution that caters to businesses in various industries such as financial ...
18. [AU10TIX](https://www.softwareadvice.ie/software/120307/au10tix) — 5.0/5 (3 reviews) — AU10TIX is a cloud-based identity management solution that helps organizations in financial services, marketplaces, t...
19. [Userfront](https://www.softwareadvice.ie/software/260196/userfront) — 5.0/5 (3 reviews) — Userfront gives secure, pre-configured authentication and authorization that stays up to date automatically. Teams fo...
20. [Access Rights Manager](https://www.softwareadvice.ie/software/412478/access-rights-manager) — 4.7/5 (3 reviews) — Access Rights Manager is a Windows-based access management tool that assists network security teams with directory mo...
21. [JiJi Self Service Password Reset](https://www.softwareadvice.ie/software/241519/jiji-password-reset-suite) — 5.0/5 (3 reviews) — JiJi Self Service Password Reset enables Active Directory users to securely reset or change the passwords of their ac...
22. [Doordesk](https://www.softwareadvice.ie/software/428472/doordesk) — 5.0/5 (3 reviews) — DoorDesk is a visitor management system designed to help businesses of all sizes streamline the visitor check-in proc...
23. [Veriff](https://www.softwareadvice.ie/software/317087/veriff) — 4.7/5 (3 reviews) — Veriff’s mission is to protect businesses and customers from online identity fraud. We do this by verifying that ever...
24. [Scrive](https://www.softwareadvice.ie/software/472998/Scrive) — 5.0/5 (3 reviews) — Scrive is a cloud-based digital signature solution that helps businesses manage online contracts and documents digita...
25. [Ryn VPN](https://www.softwareadvice.ie/software/351064/ryn-vpn) — 4.0/5 (3 reviews) — Designed for Android phones or iOS devices, Ryn VPN is a VPN solution that helps users securely browse the internet. ...

-----

Page: 5 / 10\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=4)\
Next: [Next page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.ie/directory/4329/cloud-security/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Password Management Software](https://www.softwareadvice.ie/directory/4585/password-management/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.ie/directory/4311/authentication/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4549/identity-management/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.ie/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@type":"WebSite","@id":"https://www.softwareadvice.ie/#website","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Identity Management Software","description":"Page 5 - Discover the best Identity Management Software in Ireland. Compare top Identity Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5","about":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5#webpage","mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Identity Management Software","position":2,"item":"https://www.softwareadvice.ie/directory/4549/identity-management/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Best Identity Management Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"GetID","position":1,"description":"GetID is a KYC and identity verification solution that helps businesses across finance, healthcare, banking, telecom and various other industries streamline the customer onboarding process, ease the adherence to regulatory requirements and reduce fraud.\n\n\nGetID lets users perform AML screening, liveness detection and face matching to validate customers. Professionals can check multiple ID documents such as passports, driver’s licenses or residence permits using OCR and MRZ capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/db116331-ea87-4893-a2bf-f7ee712a6cc0.jpeg","url":"https://www.softwareadvice.ie/software/118999/getid","@type":"ListItem"},{"name":"NineID","position":2,"description":"9ID is a contractor compliance platform that transforms manual, fragmented contractor verification into a scalable, automated system. We digitize the entire contractor lifecycle—from pre-qualification through site access—ensuring every external worker is authorized, certified, and compliant before arrival.\n\nWe synchronize the value chain by connecting project managers, contractors, and security teams in one integrated flow. By replacing fragmented spreadsheets and emails with real-time visibility, we eliminate billable waiting time and the hidden administrative tax of manual document chasing. When compliance is automated, projects start on time and operational risk is neutralized.\n\nTrusted by major manufacturing leaders in Europe, 9ID provides a single source of truth for global oversight while maintaining precision at the local site level. We help organizations scale their compliance standards across borders without the friction of custom projects, ensuring a waterproof system that is both efficient and auditable.\n\nKey capabilities include:\n* End-to-End Compliance Automation: Digitize the full workflow from pre-qualification to site access, replacing manual hand-offs with a scalable, productized flow.\n* Dual-Layer Verification: Simultaneously validates both the company and the individual worker to protect against modern chain liability risks.\n* Real-Time Visibility & Control: Instant access to who is on-site across multiple locations, turning an opaque process into a transparent command center.\n* Portable Worker Passports: A digital wallet that allows workers to carry verified credentials between sites, reducing repetitive admin for everyone involved.\n* Automated Gatekeeping: A simple interface for security teams that instantly grants or denies access based on live, pre-approved compliance data.\n  \n9ID differentiates itself by delivering a collaborative network rather than a \"pay-to-play\" barrier. Unlike legacy tools that dump the workload on a single stakeholder, 9ID optimizes the entire operational workflow—offering free tools for contractors to manage their own data. This turns a compliance burden into a professional advantage, ensuring that everyone on site is authorized, certified, and compliant before they arrive.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e4d2a29d-4315-426e-8f89-3b5aa1e0a2de.png","url":"https://www.softwareadvice.ie/software/428982/nineid","@type":"ListItem"},{"name":"Trust Swiftly","position":3,"description":"Trust Swiftly is a cloud-based identity verification platform that helps businesses verify their customers with over 15 identity checks. Organizations in finance, marketplaces, real estate and other verticals can enhance their onboarding processes with step-up authentication covering SMS OTP to facial biometrics. \n\nTrust Swiftly lets users customize the verification experience with multiple flows and checks to automate your customers' (KYC) compliance and protect them from online fraud. Integrations with 3rd party fraud tools can enhance machine learning models to fight complex fraud attacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2c05de48-4a17-420f-9a09-cc2d17eeb71d.jpeg","url":"https://www.softwareadvice.ie/software/345885/trust-swiftly","@type":"ListItem"},{"name":"Bravura Identity","position":4,"description":"Revolutionize your digital identity program with Bravura Identity. Implement this best-in-class solution to easily enforce security and cross-platform access policies, while upholding the principles of least privilege. \n\nManage and govern identities, groups, and access to systems and applications all from one comprehensive solution — Bravura Identity. Implemented with industry-standard best practices including automation, self-service, certification, workflow, and analytics, Bravura Identity can revolutionize your identity and access management (IAM).\n\nWith more than 150 built-in reports, dashboards, and analytics, Hitachi ID Bravura Identity can discover, detect, and proactively remedy entitlement and identity challenges like orphan and dormant accounts, segregation of duties (SoD) violations, out-of-band access accumulation, and more. It can keep your systems, data, and applications secure while proactively enforcing cross-platform access policies and upholding the principles of least privilege. \n\nHitachi ID Bravura Identity moves access changes out of the IT department and into the hands of business users with a mix of automated business processes and request approval workflows so users can increase productivity and save time. It includes the industry’s largest number of connectors to simplify integration applications and manage accounts, groups, and entitlements on-premises and in the cloud. \n\nHitachi ID Bravura Identity is part of the Hitachi ID Bravura Security Fabric. By enabling Hitachi ID Bravura Identity, Privilege, Pass, and Group within this security fabric, you can easily weave access patterns as your access management program evolves without having to install separate solutions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/83beee83-e49f-4789-901b-e0351d3045c8.jpeg","url":"https://www.softwareadvice.ie/software/360356/Bravura-Identity","@type":"ListItem"},{"name":"heylogin","position":5,"description":"heylogin is the password solution for your business. A smartphone swipe instead of a master password makes your everyday life passwordless and two-factor secure. \n\nYou don't need IT knowledge to use heylogin. heylogins simple structured administration gives you full control with just a few clicks. \n\n- Log in to any website with one click, at no extra cost for you. \n- Generate and save strong passwords with one click in heylogin to secure your accounts \n- Share passwords by drag & drop and save time and money\n- Create new teams and invite collaborators or remove them, all with just 3 clicks\n- Assign permissions to set password visibility for team members so that you keep control over your passwords\n\nAnd thanks to super-fast synchronization, it all happens in real-time. This means that even with remote work you can flexibly and quickly release or deny logins for teams.\n\nEverything done in heylogin is end-to-end encrypted. No one has access to your data except you. As a cloud-based service, heylogin uses German, ISO-27001 certified servers and is GDPR compliant, so you have one less thing to worry about.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/eea5f1ac-9973-4a0f-982e-43af5a052ecf.png","url":"https://www.softwareadvice.ie/software/363921/heylogin","@type":"ListItem"},{"name":"OpenText Identity Manager","position":6,"description":"NetIQ Identity Manager is an identity management and access governance solution that includes features for password synchronization, self-service password reset, and password policy enforcement. This helps ensure that users are using strong passwords and reduces the risk of password-related security incidents.\n\nIt provides organizations with the ability to manage user identities throughout their lifecycle, from onboarding to offboarding. This helps ensure that users have the appropriate access permissions at all times and reduces the risk of unauthorized access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1ae9d7e3-a043-4e0d-b27c-e81b53cc947d.jpeg","url":"https://www.softwareadvice.ie/software/282935/netiq-identity-manager","@type":"ListItem"},{"name":"Infisign","position":7,"description":"By embracing the Zero Trust philosophy, Infisign ensures a holistic approach to security by continuously verifying the identities and devices accessing your digital assets.\n\nWith robust Privileged Access Management (PAM) capabilities, Infisign empowers organizations to fortify their defenses against cyber threats, ensuring privileged accounts are safeguarded with precision. This includes continuous monitoring capabilities, allowing organizations to track and audit privileged user activities in real-time. In the event of a security incident or audit, organizations can easily trace and attribute actions to specific privileged users.\n\nThe platform is built on decentralized identity frameworks, offering users greater control and ownership over their digital identities. It adapts to the unique needs of every organization be it big or small, ensuring compliance with industry regulations while providing a frictionless and secure user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/08dd8cea-0d78-4fd2-892d-6a55e3c4b3f4.png","url":"https://www.softwareadvice.ie/software/436781/infisign","@type":"ListItem"},{"name":"AppViewX AVX ONE CLM","position":8,"description":"AppViewX AVX ONE CLM is a comprehensive, automated certificate lifecycle management (CLM) solution that simplifies PKI and certificate management. \nIt combines the best of automation, security, and insights to simplify all certificate operations between public and private Certificate Authorities (CAs) and the applications where certificates are deployed. \n\nAVX ONE CLM features are purpose-built to meet the certificate management needs of modern enterprise use cases, such as hybrid/multi-cloud, DevOps, and IoT. By automating PKI and certificate lifecycle operations end-to-end, AVX ONE CLM promotes agility, minimizes security risks, and enables teams to focus on business innovation and growth.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/267f9643-3106-44a9-877d-528e654b81d0.png","url":"https://www.softwareadvice.ie/software/419532/cert","@type":"ListItem"},{"name":"Campus ID Solutions","position":9,"description":"Transact's Campus ID solutions offer students the convenience of using a single ID card, whether it is in a mobile, physical, or hybrid form, to access a wide range of campus services. With the Mobile Credential feature, students can unlock doors, attend events, and perform other necessary tasks. The Campus ID solutions provided by Transact also deliver centralized and real-time data, enabling institutions to gain insights into campus activities. Additionally, these solutions facilitate contactless and cashless options, eliminating the need for physical transactions. Moreover, the ability to remotely lock down buildings and implement campus safety monitoring capabilities enhances the overall security measures in place on campus.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/472ecdb4-0f18-4c08-838d-70b1676ac5fc.jpeg","url":"https://www.softwareadvice.ie/software/354583/campus-id-solutions","@type":"ListItem"},{"name":"Entrust Identity as a Service","position":10,"description":"Entrust Identity as a Service is a cloud-based identity and access management service that provides digital security solutions for banking, government, healthcare and enterprise organizations globally. This solution streamlines identity and access management across all applications within the enterprise environment. Key features include enterprise authentication, IT account management tools, and access control for users and groups.\n\n\nEntrust Identity as a Service deconstructs complex IT operations by implementing pre-built tools and configurations to simplify the IT provisioning and management process. From a single point of control, IT professionals can route access requests, create and delete accounts, and modify and update application access across the enterprise environment. Entrust Identity as a Service integrates with LDAP and Microsoft Active Directory to connect identity management and reduce IT workload across the entire environment. \n\n\nEntrust Identity as a Service authentication capabilities allows IT professionals to handle all authentication use cases from one secure platform. These use cases include VPN access, Desktop Log-in, Customer and Partner portals, and more. This solution also includes Rest APIs for custom application support and a Service Gateway to provide secure access and connectivity to Enterprise and SaaS applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f17b2a3c-58cf-4465-b3f9-5b7dbdd55c4b.png","url":"https://www.softwareadvice.ie/software/93746/intellitrust","@type":"ListItem"},{"name":"meshcloud","position":11,"description":"meshStack is built on years of experience in cloud transformation with major customers such as Volkswagen, Metro and Commerzbank. meshStack enables companies to build a cloud foundation based on best practices, both organizationally and technically. This enables them to fully exploit the advantages of the cloud and become faster, more secure and more cost-effective. This is not possible with traditional corporate IT structures - especially in a multi-cloud context.\n\nWith meshStack platform they can centrally manage security, costs, identities, services and more for all clouds of a company. This provides a secure framework while allowing DevOps teams to access the cloud they need quickly and natively in self-service.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/347658e9-df5e-4360-98cc-b4b41ae99d99.png","url":"https://www.softwareadvice.ie/software/340975/meshcloud","@type":"ListItem"},{"name":"SecureAuth Workforce IAM","position":12,"description":"SecureAuth is a cloud-based software that helps businesses manage and verify user identities through various authentication tools, such as MFA, password-less authentication and more. Professionals can use the dashboard to monitor and gain an overview of total successful or failed login attempts via actionable analytics.\n\nSecureAuth allows organizations to configure users’ access permissions and customize authentication workflows to streamline verification processes. Managers can secure confidential information through Lightweight Directory Access Protocol (LDAP) and single sign-on (SSO) capabilities. Additionally, users can analyze behavioral signals to identify user location, cell phone network and more.\n\nSecureAuth enables businesses to detect anomalous activities and automatically generate risk scores using machine learning capabilities. Pricing is available on monthly subscriptions and support is extended via live chat, email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39af965a-881d-459f-95dc-a8191f73fdb8.png","url":"https://www.softwareadvice.ie/software/168652/secureauth-idp","@type":"ListItem"},{"name":"Uniqkey","position":13,"description":"Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.\n\nRecognized as the easiest tool to use, Uniqkey removes friction from employees’ daily workflows by automating time-consuming authentication and security tasks, thereby increasing productivity. Its intuitive and user-friendly interface makes Uniqkey the perfect choice for employees.\n\nUniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence.\n\nWith powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption.\n\nEngineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data.\n\nOur modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.\n\nTrusted by 500+ European businesses and ranked as a Top 50 Global Security Solution by G2, our platform is becoming Europe's preferred business password and access management solution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc919295-4126-4dc5-8e49-4cb66150e7f9.png","url":"https://www.softwareadvice.ie/software/425970/uniqkey","@type":"ListItem"},{"name":"Quadrant XDR","position":14,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWith intelligent action and rapid response, XDR's proprietary technology is operated by seasoned security analysts around the clock and combines the best security technology and talent in a single XDR solution. Combining a roster of expert analysts and a powerful stack of security solutions into one complete ecosystem the platform allows for users to monitor and protect our networks, eliminating time wasted through escalation, and providing a full suite of security solutions, no matter the vertical or size and much.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.softwareadvice.ie/software/417889/sagan","@type":"ListItem"},{"name":"YOUZER","position":15,"description":"Youzer is a web-based IT and SaaS account management solution that helps businesses automate employee offboarding and onboarding workflows. The platform enables users to handle resources, accounts and security of an organization.\n\n\nPrimary features of Youzer include automatic assignments, email notifications, tool recommendations, cost analysis, alert reminders, real-time view of unusual activities, usage monitoring, license optimization, summary tables and more. The solution helps users with resource acquisition process through a software library. Additionally, the platform detects problems in the company such as provisioning errors and orphaned units.\n\n\nYouzer integrates with Yammer, Active Directory, G Suite, Fleetio, Lucca Asana, Freshdesk, Breeze, Slack, Office 365 and more. Pricing of the product is based on a monthly subscription and support is extended via phone and online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/eff0a56c-4131-476f-a6ba-cf226e91a88a.png","url":"https://www.softwareadvice.ie/software/181348/youzer","@type":"ListItem"},{"name":"CloudConnexa","position":16,"description":"CloudConnexa eliminates the common complexity associated with scaling and managing network hardware, offering flexible and isolated private cloud networks under a singular owner account for streamlined management. Notably, CloudConnexa supports various use cases such as secure site-to-site networking, IoT communications, and safe remote workforce access. With this model, the service empowers businesses to maintain secure internet access points, leverage domain-based routing, and apply cybersecurity measures, all while avoiding the pitfalls of traditional VPN server installation and management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7401dd2-15d4-415c-b3bc-95e583892263.jpeg","url":"https://www.softwareadvice.ie/software/506382/Cloud-Connexa","@type":"ListItem"},{"name":"System Frontier","position":17,"description":"System Frontier is an identity management solution that caters to businesses in various industries such as financial services, energy and utilities, education, health care and more. Key features include access request management, role management, remote access management, user activity monitoring and granular access controls.\n\n\nSystem Frontier helps users to delegate admin rights to specific employees and monitor their activities. Users can leverage their existing scripts by adding them to a cloud-based toolbox and generate custom HTML forms to capture user input. The solution also features a computer management console that allows users to link to various web applications by passing variables to custom URL fields.\n\n\nThe solution can either be deployed on-premise or hosted in the cloud. Services are offered on an annual subscription basis that includes support via email, FAQs and an online support knowledge base.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a329eb4d-479d-4ff8-bb28-78f98607786d.png","url":"https://www.softwareadvice.ie/software/66345/system-frontier","@type":"ListItem"},{"name":"AU10TIX","position":18,"description":"AU10TIX is a cloud-based identity management solution that helps organizations in financial services, marketplaces, telecommunication, and other verticals handle identity verification processes. The software assists businesses with automating customer information authentication operations and ensuring compliance with regulatory guidelines.\n\n\nAU10TIX lets enterprises design personalized security measures and risk tolerance guidelines to streamline know your customer (KYC) operations and provide security from document forgery and money laundering. The document verification feature includes artificial intelligence (AI)-enabled cross-referencing system, which allows security teams to verify multilingual documents during customer onboarding. Additionally, the identity verification functionality automatically detects and notifies teams about synthetic or manipulated IDs.\n\n\nAU10TIX facilitates integration with numerous third-party applications and authentication processes via APIs. It is available on monthly subscriptions and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fab56628-caa1-4fff-9673-b5c268d747f0.png","url":"https://www.softwareadvice.ie/software/120307/au10tix","@type":"ListItem"},{"name":"Userfront","position":19,"description":"Userfront gives secure, pre-configured authentication and authorization that stays up to date automatically. Teams focus on direct setup and quality documentation to make the internet more secure. Rather than asking businesses to know and implement all the auth protocols and standards, Userfront has simple APIs and SDKs that work automatically. The solution gives security defaults that far exceed industry standards, configured automatically to remove the chance that something is misconfigured. \n\nIt is a developer-focused platform designed to make setup, administration, and maintenance easy for developers. Userfront has simple pricing and includes many enterprise-grade features like SSO and SAML in all of its tiers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19a37c48-d332-4304-9f75-1c876c41039c.png","url":"https://www.softwareadvice.ie/software/260196/userfront","@type":"ListItem"},{"name":"Access Rights Manager","position":20,"description":"Access Rights Manager is a Windows-based access management tool that assists network security teams with directory monitoring and custom reporting. It is primarily designed to scan file servers, provide role-specific templates on SharePoint and prevent suspicious account activity. Key features of Access Rights Manager include the identification of insecure accounts, user permissions management, regulatory compliance and auditing.\n\nThe Microsoft Exchange monitoring feature helps users detect unauthorized access and tracks change to mailboxes and public folders. With the Windows File Share auditing functionality, firms can visualize permissions and prevent breaches of sensitive data. Further, the cloud-based self-service permission portal allows data owners to access information without seeking clearance from the administrator.\n\nAccess Rights Manager generates audit-ready reports. Support is provided via phone and an online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8dfb08eb-830d-4450-b895-96c4a74325bf.png","url":"https://www.softwareadvice.ie/software/412478/access-rights-manager","@type":"ListItem"},{"name":"JiJi Self Service Password Reset","position":21,"description":"JiJi Self Service Password Reset enables Active Directory users to securely reset or change the passwords of their accounts. The platform allows managers to define password policies, ensure compliance as per industry regulations and conduct security audits.\n\nProfessionals can utilize JiJi Self Service Password Reset to manage cached domain passwords in the absence of domain network connectivity. It helps employees to lock or unlock their accounts, update account information and directly reset passwords through mobile devices, Outlook or websites. Additionally, it offers a variety of features such as audit logs, multi-factor authentication, activity monitoring, privileged account management and more.\n\nJiJi Self Service Password Reset comes with an application programming interface (API), which allows integration with various third-party platforms. Pricing is available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7a032d22-b11d-4ac6-8de2-7aab31fc12f5.png","url":"https://www.softwareadvice.ie/software/241519/jiji-password-reset-suite","@type":"ListItem"},{"name":"Doordesk","position":22,"description":"DoorDesk is a visitor management system designed to help businesses of all sizes streamline the visitor check-in process. Visitors can easily handle check-in and check-out processes. Users can capture visitor photos, print badges, and send email notifications to hosts when their visitors arrive.\n\nDoorDesk allows hosts to pre-register visitors and set up custom check-in workflows based on the type of visitor, event, or location. Administrators can track visitor data, monitor visitor traffic, and identify trends over time. This information can be used to improve security measures and enhance the overall visitor experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7df8f680-d4f7-4f51-a8ea-d9fe3931c355.jpeg","url":"https://www.softwareadvice.ie/software/428472/doordesk","@type":"ListItem"},{"name":"Veriff","position":23,"description":"Veriff’s mission is to protect businesses and customers from online identity fraud. We do this by verifying that every user on our platform is who they say they are, while ensuring an optimal customer experience at the same time. Veriff has developed a proprietary technology platform to verify people across 230+ countries in 48 languages, based on thousands of behavioral and technological variables. This includes photo, personal data and social media verification backed by proprietary machine learning algorithms, enabling efficient and reliable identity checks for online sign-ups with simple user experience in just a few seconds.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89cd5249-815d-402b-b692-da007839a5ad.png","url":"https://www.softwareadvice.ie/software/317087/veriff","@type":"ListItem"},{"name":"Scrive","position":24,"description":"Scrive is a cloud-based digital signature solution that helps businesses manage online contracts and documents digitally. The platform caters to businesses of all sizes across various industries such as banking, finance, insurance, automotive, telecom, real estate, legal and human resources (HR). It offers various electronic signature modules including eSign Online, eSign GO, and eSign API. These allow organizations to upload documents and get them signed instantly. Additionally, Scrive provides secure identity verification services through its eID Hub and ID Check. This enables secure login authentication, document signing and KYC checks through a single API.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c687ef10-b622-4348-ba54-a6c0c8167e3f.png","url":"https://www.softwareadvice.ie/software/472998/Scrive","@type":"ListItem"},{"name":"Ryn VPN","position":25,"description":"Designed for Android phones or iOS devices, Ryn VPN is a VPN solution that helps users securely browse the internet. It allows users to connect to public Wi-Fi hotspots and browse the internet anonymously without exposing their identity. The solution helps users unlock any website and app on any platform. Key features include no-logs policy, data encrytion, global acess and more. Pricing is based on monthly subscriptions and support is extended via chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6132c946-99d8-4a3c-abe8-c6a6e0b0b365.jpeg","url":"https://www.softwareadvice.ie/software/351064/ryn-vpn","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=5#itemlist","numberOfItems":25}
</script>
