---
description: Page 7 - Discover the best Identity Management Software in Ireland. Compare top Identity Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 7 - Best Identity Management Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Identity Management Software](https://www.softwareadvice.ie/directory/4549/identity-management/software) > [Page 7](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7)

# Identity Management Software

Canonical: https://www.softwareadvice.ie/directory/4549/identity-management/software

Page: 7 / 10\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=6)\
Next: [Next page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=8)

-----

## Products

1. [Atlassian Access](https://www.softwareadvice.ie/software/431253/atlassian-access) — 5.0/5 (1 reviews) — Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud application...
2. [NIM](https://www.softwareadvice.ie/software/365220/nim) — 5.0/5 (1 reviews) — NIM is an on-premise solution that provides enterprise-level user provisioning for educational institutions and organ...
3. [Soffid IAM](https://www.softwareadvice.ie/software/293928/soffid-iam) — 5.0/5 (1 reviews) — Soffid IAM is a converged IAM platform that brings together Access Management (AM), Identity Governance (IGA), Identi...
4. [Sima](https://www.softwareadvice.ie/software/360785/sima) — 5.0/5 (1 reviews) — Sima is a cloud-based authentication platform that provides highly secure, seamless access control for companies and ...
5. [ZertID](https://www.softwareadvice.ie/software/338582/zertid) — 5.0/5 (1 reviews) — The software allows companies to mitigate risks and safeguard their data from a breach through continuous monitoring....
6. [SecureONE](https://www.softwareadvice.ie/software/337919/secureone) — 5.0/5 (1 reviews) — SecureONE is a tool designed for privileged access management. It helps manage user access across departments, branch...
7. [Sonrai Public Cloud Security Platform](https://www.softwareadvice.ie/software/386157/sonrai-public-cloud-security-platform) — 5.0/5 (1 reviews) — Sonrai Public Cloud Security Platform delivers an enterprise identity and data governance platform to protect your cl...
8. [TeleSign Platform](https://www.softwareadvice.ie/software/368816/telesign-platform) — 5.0/5 (1 reviews) — TeleSign connects and protects online experiences with sophisticated customer identity and engagement solutions to en...
9. [Gataca](https://www.softwareadvice.ie/software/397126/gataca) — 5.0/5 (1 reviews) — Gataca is a digital identity platform that helps regulated organizations verify customers faster using real-time iden...
10. [Defend](https://www.softwareadvice.ie/software/229228/defend) — 4.0/5 (1 reviews) — Plurilock DEFEND is deployed as a low-level, lightweight software agent on Windows and Mac OS systems. Plurilock DEFE...
11. [BastionPass](https://www.softwareadvice.ie/software/184453/bastionpass) — 5.0/5 (1 reviews) — BastionPass is a password management platform designed to help individuals and businesses manage and store their pass...
12. [LogonBox](https://www.softwareadvice.ie/software/241509/logonbox) — 5.0/5 (1 reviews) — LogonBox is a self-service password reset (SSPR) solution that helps businesses manage passwords across multiple exte...
13. [RightCrowd Access Analytics](https://www.softwareadvice.ie/software/197917/rightcrowd-iq) — 5.0/5 (1 reviews) — RightCrowd Access Analytics automates your user access reviews, reduces audit time and helps to demonstrate user acce...
14. [Veza](https://www.softwareadvice.ie/software/396113/veza) — 5.0/5 (1 reviews) — Veza provides a simple way to visualize the full complexity of identity-to-data relationships and provides both out-o...
15. [Regula](https://www.softwareadvice.ie/software/261431/regula) — 5.0/5 (1 reviews) — Regula Document Reader SDK is a comprehensive ID verification solution for the fully automatic reading and authentica...
16. [Alice Biometrics](https://www.softwareadvice.ie/software/330157/alice-biometrics) — 5.0/5 (1 reviews) — Alice Biometrics is an identity verification solution catering to businesses in the transportation, banking, travel, ...
17. [The OptimalCloud](https://www.softwareadvice.ie/software/317728/the-optimalcloud) — 4.0/5 (1 reviews) — The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various ...
18. [BAAR-IGA](https://www.softwareadvice.ie/software/345204/baariga) — 5.0/5 (1 reviews) — BAAR-IGA is an automated end-to-end solution for managing identities in your organization. The AI-powered workflows h...
19. [Netwrix Directory Manager](https://www.softwareadvice.ie/software/521564/Netwrix-GroupID) — 3.0/5 (1 reviews) — Netwrix GroupID is a group and user management software that helps organizations streamline their directory managemen...
20. [theSavvySuite](https://www.softwareadvice.ie/software/451313/theSavvySuite) — 4.0/5 (1 reviews) — theSavvySuite is a business software solution that helps organizations manage employee identities, IT services, and i...
21. [IntelleWings](https://www.softwareadvice.ie/software/507778/IntelleWings) — 5.0/5 (1 reviews) — IntelleWings is a comprehensive solution for anti-money laundering and counter financing of terrorism compliance. It ...
22. [IDnow](https://www.softwareadvice.ie/software/483444/IDnow) — 5.0/5 (1 reviews) — IDnow is a web-based identity verification platform which is compliant with regulations such as AML and eIDAS. IDnow'...
23. [PingFederate](https://www.softwareadvice.ie/software/332266/pingfederate) — 5.0/5 (1 reviews) — PingFederate is a cloud-based software designed to streamline user authentication and single sign-on (SSO) authorizat...
24. [Folio](https://www.softwareadvice.ie/software/98138/folio) (0 reviews) — Folio helps organizations manage digital identity registrations, issuance, and verifications via an interactive platf...
25. [Appsian Security Platform](https://www.softwareadvice.ie/software/182143/appsian-security-platform) (0 reviews) — Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentic...

-----

Page: 7 / 10\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=6)\
Next: [Next page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=8)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.ie/directory/4329/cloud-security/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Password Management Software](https://www.softwareadvice.ie/directory/4585/password-management/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.ie/directory/4311/authentication/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4549/identity-management/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.ie/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@type":"WebSite","@id":"https://www.softwareadvice.ie/#website","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Identity Management Software","description":"Page 7 - Discover the best Identity Management Software in Ireland. Compare top Identity Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7","about":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7#webpage","mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Identity Management Software","position":2,"item":"https://www.softwareadvice.ie/directory/4549/identity-management/software","@type":"ListItem"},{"name":"Page 7","position":3,"item":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 7 - Best Identity Management Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Atlassian Access","position":1,"description":"Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud applications. With single sign-on (SSO), admins can set up one-click access to company apps and enable employees to deploy software. It allows users to enforce two-step verification (2FA) and revoke unauthorized tokens. Admins can also monitor usage and customize multiple authentication policies using a single dashboard, while reviewing audit logs and product reports. Integrations with other CASBs, 24/7 support, and customizable billing are some of the other key features offered by Atlassian Access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96f403cb-590e-4582-9c16-e390449d2daa.png","url":"https://www.softwareadvice.ie/software/431253/atlassian-access","@type":"ListItem"},{"name":"NIM","position":2,"description":"NIM is an on-premise solution that provides enterprise-level user provisioning for educational institutions and organizations with large complex data sets. Provisioning is always the goal, but data visibility is king. With NIM's unique multi-source and target data aggregation features, data from multiple systems can be viewed and utilized for provisioning, rostering, and basic exports. Automate the entire user lifecycle process and role management with NIM to meet current and future needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/926e4962-f889-4107-827e-3135d1a56e69.png","url":"https://www.softwareadvice.ie/software/365220/nim","@type":"ListItem"},{"name":"Soffid IAM","position":3,"description":"Soffid IAM is a converged IAM platform that brings together Access Management (AM), Identity Governance (IGA), Identity Risk & Compliance (IRC) and Privileged Account Management (PAM) into one comprehensive solution - aimed at bringing your security and IT teams together. Soffid is fully scalable, allowing you to start small and grow as needed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/333f80f6-7a9d-4828-924d-71638a2bd3af.png","url":"https://www.softwareadvice.ie/software/293928/soffid-iam","@type":"ListItem"},{"name":"Sima","position":4,"description":"Sima is a cloud-based authentication platform that provides highly secure, seamless access control for companies and organizations. Sima helps users establish schedules for visitors' access to their sites, allowing them to grant permission during specific hours and refuse it at others. \n\nThe system's database query feature makes it easy to see when people arrived at or left a facility—allowing users to track the whereabouts of everyone who was present. Additionally, it offers customer support via phone, email, FAQs, chat and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e35dfe01-2023-4619-bc7f-5a0eda8d705c.png","url":"https://www.softwareadvice.ie/software/360785/sima","@type":"ListItem"},{"name":"ZertID","position":5,"description":"The software allows companies to mitigate risks and safeguard their data from a breach through continuous monitoring. It has real-time centralized visibility, where managers can view who has access to what information. It enables them to notice unauthorized entry, policy violations, and weak points in their system. In the process, ZertID allows business admins and IT teams to take the necessary steps to lock out inappropriate access and reduce risk factors.\n\nZertID allows the IT and management personnel to ensure they take the proper steps to follow the security and privacy regulations governing IGA. It offers uniform access management and administration processes controlled by a standard policy, role, and risk model that allows for more uncomplicated auditing. Organisations can formulate repetitive operations for simpler access certification using role-based dashboards and access. Furthermore, the platform reduces the cost of auditing and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96fd03c6-527b-476b-b706-de140c7fbbca.png","url":"https://www.softwareadvice.ie/software/338582/zertid","@type":"ListItem"},{"name":"SecureONE","position":6,"description":"SecureONE is a tool designed for privileged access management. It helps manage user access across departments, branches, and hierarchies. IT administrators can access an overview of system statuses, active sessions, and user identities with the Lightweight Directory Access Protocol (LDAP) mechanism. They can stop lateral movement, prevent ransomware, provide endpoint security, set up security orchestration, and draft remediation strategies. \n\nUsers can also find and remove instances of access sprawl from the system. SecureONE lets them set up two-factor authentication to prevent data leakage or exploitation and restrict access based on roles or attributes. They can also grant on-demand access using Just-in-Time (JIT) methods or enable Zero Standing Privilege (ZSP). \n\nSecureONE provides security information and deploys event management methodology. IT administrators can scan servers or desktops to perform compliance audits. Multi-factor authentication mandates enable security and breach detection across multiple networks. Security orchestration, automation, and response make threat identification and remedial strategies in line with the National Institute of Standards and Technology's requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/51173fc4-7ce0-4b13-b55c-6b387646c2fd.png","url":"https://www.softwareadvice.ie/software/337919/secureone","@type":"ListItem"},{"name":"Sonrai Public Cloud Security Platform","position":7,"description":"Sonrai Public Cloud Security Platform delivers an enterprise identity and data governance platform to protect your cloud from insider threats, external threats, cybercrime, and information loss.\n\nSonrai gives IT teams the visibility, automation and controls they need to manage user access, audit compliance, and protect privacy. It allows managers to handle organizational resources across a variety of platforms including AWS, Azure, Google Cloud, and Kubernetes. Pricing details are available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d11dd326-962f-47dc-a27d-fcaf0e89e864.png","url":"https://www.softwareadvice.ie/software/386157/sonrai-public-cloud-security-platform","@type":"ListItem"},{"name":"TeleSign Platform","position":8,"description":"TeleSign connects and protects online experiences with sophisticated customer identity and engagement solutions to enables businesses to register accounts, verify phone numbers, identify users, prevent fraud, streamline customer engagement and more.\n\nThrough APIs that deliver user verification, data insights, and communications TeleSign solves today’s unique customer challenges by bridging your business to the complex world of global telecommunications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/56567ea9-01d7-4dae-b629-eb582aed613c.png","url":"https://www.softwareadvice.ie/software/368816/telesign-platform","@type":"ListItem"},{"name":"Gataca","position":9,"description":"Gataca is a digital identity platform that helps regulated organizations verify customers faster using real-time identity intelligence built on top of digital identity wallets.\n\nGataca offers two main products: Gataca Wallet and Gataca Studio.\n\nGataca Wallet is a digital identity wallet, a mobile app, that enables users to store and share verifiable credentials—such as national IDs, driver’s licenses, or diplomas—to authenticate easily in digital services.\n\nThese credentials are digitized according to open standards, cryptographically signed by authorities, and protected with biometrics and encryption, so only the user is in complete control of their data. Available on iOS and Android.\n\nGataca Studio is a digital identity management platform that enables organizations to interact with ID Wallets for instant identity verification and authentication, issue credentials and interpret identity signals in one place. \n\nGataca’s main competitive advantage is the combination of digital identity wallets with a real-time identity intelligence layer. While most competitors focus primarily on credential issuance and verification infrastructure, Gataca adds dynamic trust scoring and behavioral insights.\n\nThis approach allows legitimate users to complete processes with minimal friction while strengthening controls in higher-risk scenarios, instead of forcing organizations to trade one for another. Additionally, Gataca provides privacy-preserving market insights derived from identity interactions, enabling better fraud prevention, product optimization, and regulatory compliance.\n\nIt also includes Vouch Age Verification, allowing media companies to verify the age of their users in seconds for compliant and anonymous access to age-restricted content.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/93dd13c0-de59-4bac-9407-4b0218ce8cf4.jpeg","url":"https://www.softwareadvice.ie/software/397126/gataca","@type":"ListItem"},{"name":"Defend","position":10,"description":"Plurilock DEFEND is deployed as a low-level, lightweight software agent on Windows and Mac OS systems. Plurilock DEFEND monitors all keyboard and pointer activity on the workstation or endpoint, using behavioral biometrics to verify the identity of the logged-in user every 3-5 seconds. The outcomes of these regular checks can be used to lock the workstation when a user’s identity can no longer be confirmed or to provide detailed identity input to SIEM systems or other security frameworks for further action.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a7c5efe-6cec-4fe5-b15a-51a1237cf708.png","url":"https://www.softwareadvice.ie/software/229228/defend","@type":"ListItem"},{"name":"BastionPass","position":11,"description":"BastionPass is a password management platform designed to help individuals and businesses manage and store their passwords for multiple sites or platforms in one secure place. The solution allows users to store passwords and other login credentials in online \"safes\" and share them securely with other team members for collaborative tasks.\n\n\nWith the aim of providing single identity management and password sharing capabilities to businesses, BastionPass offers a range of features including cross-platform functionality, sharable safes, plugins for multiple browsers, two-factor authentication, a proxy email service and more. The BastionPass plugin can be used on Chrome, Firefox and Edge browsers and the mobile apps for Android and iOS mean that users can access their login credentials and safely access sites whilst on-the-go. \n\n\nBastionPass offers support in the form of an online knowledge base, FAQs and online requests. Pricing plans are available for individuals, families, and businesses and business plans are billed per user, per month.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d655ed74-7cf7-400f-9ce0-d1ccb4acf9d0.png","url":"https://www.softwareadvice.ie/software/184453/bastionpass","@type":"ListItem"},{"name":"LogonBox","position":12,"description":"LogonBox is a self-service password reset (SSPR) solution that helps businesses manage passwords across multiple external systems, including GSuite, O365, Active Directory, Microsoft Azure, and more on a centralized platform. It allows administrators to configure multi-factor authentication, set up single sign-on, and assign privileged resource credentials, ensuring user and data security.\n\nLogonBox enables staff members to create security questions to reset or unlock accounts without involvement from the service desk. Employees can automatically generate system enrollment reminders and password expiration notifications. It offers a SAML-based identity provider, which allows staff members to log into multiple third-party services. Additionally, the built-in dashboard allows team members to track password history, user behavior, account activity, and session history.\n\nLogonBox allows organizations to integrate the platform with several third-party solutions such as Duo Authentication, Yubikey, Google Auth, and more. It is available on annual subscriptions and support is extended via documentation, video tutorials, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/acee1583-0160-4268-bc25-c9eb4323a77c.png","url":"https://www.softwareadvice.ie/software/241509/logonbox","@type":"ListItem"},{"name":"RightCrowd Access Analytics","position":13,"description":"RightCrowd Access Analytics automates your user access reviews, reduces audit time and helps to demonstrate user access compliance across every standard or regulation (ISO 27001, SOX, SOC1/2, HITRUST, PCI-DSS, HIPAA etc). \n\nIt allows HR, IT, OT security teams to easily collaborate, review and take action against inappropriate access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d45aff52-6cfc-4149-912b-ac67d7720b0c.png","url":"https://www.softwareadvice.ie/software/197917/rightcrowd-iq","@type":"ListItem"},{"name":"Veza","position":14,"description":"Veza provides a simple way to visualize the full complexity of identity-to-data relationships and provides both out-of-the-box and custom reports, alerts and risks, and much more.\n\nConfiguring Veza is quick and easy; it typically takes under an hour to have a functional system up and running. All the product needs is access to a read-only role in the target systems; it will discover the data structures and permissions automatically. As soon as the product has ingested data from an integrated system, it will immediately start showing information about Veza-identified security risks revealed by that new data.\n\nStarting from the Veza dashboard, these surfaced results can be explored in expertly curated assessments, collected views of discovered risks, and Veza- created alerts. All of this information can be viewed, filtered, and aggregated in the Authorization Graph, a visual representation of the identity-to-data relationships that includes metadata details of all the entities in these relationships. Custom queries for the Authorization Graph using the Query Builder enable customers to find potential issues and violations that might be specific to their own organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9495d972-d20b-449e-8ae2-d1d35fdb7d91.jpeg","url":"https://www.softwareadvice.ie/software/396113/veza","@type":"ListItem"},{"name":"Regula","position":15,"description":"Regula Document Reader SDK is a comprehensive ID verification solution for the fully automatic reading and authentication of passports, ID cards, driver’s licenses, visas, and other identity documents.\n\nThe solution enables identity verification while requiring little action from the user.\n\n- Detects and beats fraud at early stages, no matter old or new the format of the ID\n- Reduces onboarding time and increases customer loyalty\n- Builds a smooth and customized KYC workflow\n- Makes sure your processes are secure and compliant\n- Automates data entry","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ece0f256-9eb5-4620-bc49-2428d08a8a74.png","url":"https://www.softwareadvice.ie/software/261431/regula","@type":"ListItem"},{"name":"Alice Biometrics","position":16,"description":"Alice Biometrics is an identity verification solution catering to businesses in the transportation, banking, travel, healthcare, automotive, financial services, telecommunication, human resources, retail, legal services, information security, and hospitality among other industries that require secure user authentication and fraud prevention.\n\nAlice Biometrics offers facial recognition, passive liveness detection, ID capture and reading, identity document validation, and biometric login features. The facial recognition feature uses computer vision and deep learning algorithms to help administrators verify a user's identity. Passive liveness detection helps users prevent spoofing attempts by detecting physical presence. The ID capture and reading function enables organizations to extract data from identity documents to validate the information provided by the user. Identity document validation authenticates government-issued IDs to combat fraud. Biometric login enables users to access accounts and services using facial recognition technology.\n\nAlice Biometrics is deployed through an on-premise appliance or a cloud-hosted web service. The solution is supported by a team of identity verification experts who provide implementation services and customer support.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3b45dcbc-610f-4717-ad50-884d6b0b6c9d.jpeg","url":"https://www.softwareadvice.ie/software/330157/alice-biometrics","@type":"ListItem"},{"name":"The OptimalCloud","position":17,"description":"The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various applications using single sign-on (SSO) authentication technology. The platform includes audit trails, which enable organizations to view and monitor user activities across applications, groups and devices on a unified portal.\n\n\nThe OptimalCloud enables users to assign tasks to teams, reset passwords, submit registration requests, and approve workflows. It offers a variety of features such as a self-service portal, mobile device push authentication, multiple users, activity tracking, custom configuration and more. Additionally, the built-in multi-factor authentication functionality lets administrators manage access to applications on internal or external networks through one-time passwords and text-based verifications.\n\n\nThe OptimalCloud facilitates integration with various third-party applications including Dropbox, Zoho, Amazon Web Services, Confluence, CenturyLink and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76e2f4f9-c80f-4f81-9e17-03bb8768ad26.png","url":"https://www.softwareadvice.ie/software/317728/the-optimalcloud","@type":"ListItem"},{"name":"BAAR-IGA","position":18,"description":"BAAR-IGA is an automated end-to-end solution for managing identities in your organization. The AI-powered workflows help ensure identities are secure.\n\nBAAR-IGA helps organizations manage who should have access, who has access, and how is the access being used. \n\nBAAR-IGA, in an automated manner, enables user lifecycle management (onboarding & terminations), password resets, access provisioning, segregation of duties, and user access review (with automated access revoke and change).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c07fbfb-3ba6-41d2-802d-14b3ebc1f026.png","url":"https://www.softwareadvice.ie/software/345204/baariga","@type":"ListItem"},{"name":"Netwrix Directory Manager","position":19,"description":"Netwrix GroupID is a group and user management software that helps organizations streamline their directory management and enhance security. The software caters to businesses of all sizes, from small and medium enterprises to large corporations, across various industries such as healthcare, finance, and government.\n\nNetwrix GroupID automates and delegates group and user management to ensure directories remain current and secure. It allows organizations to streamline group and user management through attestation workflows, which require group owners and users to regularly validate their active status. This helps keep the directory clean and minimizes the attack surface. The software also automatically ensures accurate group memberships as user attributes change, by creating queries that determine group membership based on users' current attributes. This helps organizations untangle nested groups and simplify the creation of group hierarchies, ensuring that changes to parent groups are automatically reflected in child groups.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b4d7e5e0-5901-408b-a9fa-e3d1553fad21.png","url":"https://www.softwareadvice.ie/software/521564/Netwrix-GroupID","@type":"ListItem"},{"name":"theSavvySuite","position":20,"description":"theSavvySuite is a business software solution that helps organizations manage employee identities, IT services, and internal processes. It caters to a range of industries, from small businesses to large enterprises.\n\nThe solution's core features include Identity Management capabilities, which synchronize employee data across systems and automate IT provisioning tasks. theSavvySuite also offers a Service Catalog, allowing employees to order, modify, or cancel IT services through a web interface. The system uses configurable rules and processes to streamline service delivery.\n\nAdditionally, theSavvySuite's process automation capabilities extend beyond the IT department, enabling the automation of internal chargeback and other business workflows. Designed as a configurable standard product, theSavvySuite can be tailored to the unique needs of large enterprises.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/923340b9-fb44-40e9-8c85-06c3ead9882b.jpeg","url":"https://www.softwareadvice.ie/software/451313/theSavvySuite","@type":"ListItem"},{"name":"IntelleWings","position":21,"description":"IntelleWings is a comprehensive solution for anti-money laundering and counter financing of terrorism compliance. It serves a variety of sectors, including banking, insurance, real estate, jewelry retailers, and e-commerce, helping them adhere to regulatory standards.\n\nThe software offers a customizable sanctions screening scanner with a worldwide database. It also includes automated reporting, user-friendly navigation, optimized settings, and case management features. IntelleWings incorporates artificial intelligence in its transaction monitoring to minimize false positives and automate suspicious transaction or cash transaction reports.\n\nThe system allows efficient searches for politically exposed persons and adverse media through automated searches in reliable news sources. It also provides real-time anti-money laundering screening, using regularly updated global data, precise search filters, and accurate data.\n\nAdditional features of IntelleWings include AI-driven transaction monitoring, an intelligent alert system, and flexible file exporting. The software streamlines customer due diligence and can be scaled to fit organizations of different sizes. With its advanced machine learning capabilities, IntelleWings assists businesses in detecting fraud and maintaining compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ac5423b6-a129-493b-9732-69a9a588d67d.png","url":"https://www.softwareadvice.ie/software/507778/IntelleWings","@type":"ListItem"},{"name":"IDnow","position":22,"description":"IDnow is a web-based identity verification platform which is compliant with regulations such as AML and eIDAS. IDnow's fraud prevention technology and monitoring services help protect businesses against fake IDs, synthetic identities, deepfakes and other suspicious activities.\n\nIDnow helps businesses enhance their customer onboarding experience without compromising security or privacy. It offers features such as automated identity verification, video verification, in-person verification and digital signature.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5489d7c6-edae-4535-b828-4af8bfcd26cc.png","url":"https://www.softwareadvice.ie/software/483444/IDnow","@type":"ListItem"},{"name":"PingFederate","position":23,"description":"PingFederate is a cloud-based software designed to streamline user authentication and single sign-on (SSO) authorization process. With support for industry-standard identity protocols like OAuth, OpenID Connect, SAML, and WS-Federation, it integrates with existing systems and offers rapid deployment capabilities.\n\nPingFederate simplifies the implementation of federated identity networks, supporting browser-based SSO and integrating with a wide range of cloud, mobile, SaaS, API, and on-premises applications. Security measures such as multi-factor authentication (MFA), contextual MFA, and adaptive authentication help protect against unauthorized access and data breaches. It offers consistent sign-on and registration processes across channels, with pre-built templates for user registration and profile management. The platform also allows administrators to easily configure authentication policies, evaluate user request conditions, and create customized policies.\n\nWith PingFederate, organizations can achieve centralized identity management, eliminate insecure password practices, reduce the risk of unauthorized access, and minimize friction in the user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4fbe4a74-0e98-4246-83b4-2061452b9a58.png","url":"https://www.softwareadvice.ie/software/332266/pingfederate","@type":"ListItem"},{"name":"Folio","position":24,"description":"Folio helps organizations manage digital identity registrations, issuance, and verifications via an interactive platform. It allows organizations to build secure and private identity solutions for delivering consumer-centric services.\n\n\nFolio enables businesses to register users and issue digital identity credentials on their smartphones via the Folio mobile application. Enterprises can utilize the credentials stored on the mobile app to remotely verify a user’s identity. The solution supports integration with existing working practices and various third-party systems using an open architecture and API. Secured with data encryption and biometric multi-factor authentication, it facilitates secure verification and data sharing via access permissions.\n\n\nFolio application is available for free and on monthly, yearly or transaction-based pricing. The support is provided via FAQs and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/08d13625-cd9e-4499-adb2-260b8a60b4bb.png","url":"https://www.softwareadvice.ie/software/98138/folio","@type":"ListItem"},{"name":"Appsian Security Platform","position":25,"description":"Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentication, network security, and other operations for PeopleSoft and SAP applications. The platform includes a transaction logging functionality, which lets administrators record user activities and session time.\n\n\nAppsian Security Platform allows IT teams to provide role-based permissions and hide data across search results, fields, queries and browsers via a unified portal. It offers a host of features such as remote access, configurable rule engine, location-based security, threat detection and prevention, risk assessment and more. Additionally, managers can generate reports to analyse usage trends, data access, privileged accounts usage, security alerts and other metrics using Appsian 360 application.\n\n\nAppsian Security Platform supports integration with various third-party systems including Oracle, Duo, Okta, Twilio and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd3ac52e-d138-450d-90b6-18161508aeb3.png","url":"https://www.softwareadvice.ie/software/182143/appsian-security-platform","@type":"ListItem"}],"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=7#itemlist","numberOfItems":25}
</script>
