---
description: Page 9 - Discover the best Identity Management Software in Ireland. Compare top Identity Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 9 - Best Identity Management Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Identity Management Software](https://www.softwareadvice.ie/directory/4549/identity-management/software) > [Page 9](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9)

# Identity Management Software

Canonical: https://www.softwareadvice.ie/directory/4549/identity-management/software

Page: 9 / 10\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=8)\
Next: [Next page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=10)

-----

## Products

1. [Verosint](https://www.softwareadvice.ie/software/403157/verosint) (0 reviews) — Verosint is a leading provider of account fraud detection and prevention platform helping digital businesses answer t...
2. [Haventec Authenticate](https://www.softwareadvice.ie/software/400273/haventec-authenticate) (0 reviews) — Introducing Haventec Authenticate, the next-generation authentication engine that offers easy accessibility, cost-eff...
3. [KYC Hub](https://www.softwareadvice.ie/software/173287/kyc-and-aml) (0 reviews) — Designed for businesses in real estate, banking, trading and other industries, KYC Hub is an identity verification pl...
4. [TrustLogin](https://www.softwareadvice.ie/software/393969/trustlogin) (0 reviews) — TrustLogin is a cloud-based solution that allows users to sign in to multiple cloud services using a single set of lo...
5. [Cyberelements](https://www.softwareadvice.ie/software/419007/cyberelements) (0 reviews) — Designed for businesses of all sizes, Cyberelements is a cloud-based access management solution that helps analyze us...
6. [Pathlock](https://www.softwareadvice.ie/software/419600/pathlock) (0 reviews) — Pathlock is a comprehensive cloud-based platform designed to help organizations secure, monitor, and automate their b...
7. [ReachFive](https://www.softwareadvice.ie/software/366511/reachfive) (0 reviews) — ReachFive is an enterprise SaaS Customer Identity and Access Management (CIAM) platform, designed to build strong, tr...
8. [Build38](https://www.softwareadvice.ie/software/349471/build38) (0 reviews) — Build38 is a cloud-based identity verification solution that helps organizations in the healthcare, financial service...
9. [Jira Oauth](https://www.softwareadvice.ie/software/371327/jira-oauth) (0 reviews) — Jira OAuth is a cloud-based platform that enables OAuth/OpenID Single Sign On (SSO) for Jira Software and Jira Servic...
10. [BlockID](https://www.softwareadvice.ie/software/426460/blockid) (0 reviews) — 1Kosmos unifies identity proofing and passwordless authentication to empower workers, customers, and citizens, to acc...
11. [Zoho Directory](https://www.softwareadvice.ie/software/427793/zoho-directory) (0 reviews) — If you're looking for a secure workforce identity and access management (IAM) software, Zoho Directory is the solutio...
12. [M365 Manager Plus](https://www.softwareadvice.ie/software/357494/m365-manager-plus) (0 reviews) — Designed for businesses in technology, consumer electronics, consulting and other industries, M365 Manager Plus is an...
13. [Enso](https://www.softwareadvice.ie/software/437373/enso) (0 reviews) — Enso is an identity management software that helps to streamline and automate tasks associated with hardware preparat...
14. [Securden](https://www.softwareadvice.ie/software/356908/securden) (0 reviews) — Securden is an identity management software designed to help businesses of all sizes handle privileged accounts and p...
15. [PropelAuth](https://www.softwareadvice.ie/software/401463/propelauth) (0 reviews) — PropelAuth is a cloud-based identity and access management solution for software applications catering to software co...
16. [KYDSO](https://www.softwareadvice.ie/software/518801/KYDSO) (0 reviews) — KYDSO is a cloud-based identity management solution that simplifies and secures the management of accounts within you...
17. [Cavelo Attack Surface Management](https://www.softwareadvice.ie/software/521046/Cavelo-Attack-Surface-Management) (0 reviews) — Cavelo is an attack surface management platform built for managed service providers (MSPs) that helps measure and pro...
18. [Netwrix Identity Manager](https://www.softwareadvice.ie/software/521562/Netwrix-Usercube) (0 reviews) — Netwrix Usercube is an identity governance and administration (IGA) solution designed to automate, govern, and contro...
19. [swIDch PLC-OTAC](https://www.softwareadvice.ie/software/523048/swIDch-PLC-OTAC) (0 reviews) — swIDch PLC-OTAC is a multi-factor authentication solution that utilizes dynamic one-time authentication codes to incr...
20. [SecureAuth CIAM](https://www.softwareadvice.ie/software/527035/SecureAuth-CIAM) (0 reviews) — SecureAuth CIAM is a customer identity and access management solution. It enables businesses to provide a simple, sec...
21. [Melapress Login Security](https://www.softwareadvice.ie/software/527086/Melapress-Login-Security) (0 reviews) — Melapress Login Security is a WordPress plugin that helps website administrators enhance the security of their websit...
22. [Tecalis Authentication](https://www.softwareadvice.ie/software/528733/Tecalis-Authentication) (0 reviews) — Tecalis Authentication is a multi-factor authentication solution that combines biometrics features to provide securit...
23. [QDesk](https://www.softwareadvice.ie/software/518249/QDesk) (0 reviews) — QDesk is an end-user access management platform designed to simplify privilege management through identity verificati...
24. [Scalefusion OneIdP](https://www.softwareadvice.ie/software/530037/OneIdP) (0 reviews) — OneIdP is a solution that enables secure access for users and devices. The solution uses a zero trust model. It grant...
25. [Mumba Access](https://www.softwareadvice.ie/software/459338/Mumba-Cloud) (0 reviews) — Mumba Access is a SaaS solution that enables business leaders to carry out any strategic, tactical or operational ini...

-----

Page: 9 / 10\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=8)\
Next: [Next page](https://www.softwareadvice.ie/directory/4549/identity-management/software?page=10)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.ie/directory/4329/cloud-security/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Password Management Software](https://www.softwareadvice.ie/directory/4585/password-management/software)
- [Privileged Access Management Software](https://www.softwareadvice.ie/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.ie/directory/4311/authentication/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4549/identity-management/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@id":"https://www.softwareadvice.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Identity Management Software","description":"Page 9 - Discover the best Identity Management Software in Ireland. Compare top Identity Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9","about":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9#breadcrumblist"},"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9#itemlist"},"publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Identity Management Software","position":2,"item":"https://www.softwareadvice.ie/directory/4549/identity-management/software","@type":"ListItem"},{"name":"Page 9","position":3,"item":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 9 - Best Identity Management Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.ie/directory/4549/identity-management/software?page=9#itemlist","@type":"ItemList","itemListElement":[{"name":"Verosint","position":1,"description":"Verosint is a leading provider of account fraud detection and prevention platform helping digital businesses answer the question of “who’s there?” \n\nBy combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts. \n\nSignalPrint™ is patent-pending technology that combines cross-platform and user fingerprinting with machine learning. Verosint analyzes events, risk signals and historical activity transforming millions of data points into actionable insights to help identify risk users from legitimate ones before they login. From there, Verosint orchestrates a flow to either add friction or streamline access based on its credibility and legitimacy. \n\nThrough automation, we alleviate hours and costs for fraud and risk teams, eliminating false positives, reducing manual reviews and remediating risks along the way - all while accelerating access for true customers. By preventing malicious users, bots and hackers from gaining access to your application and business, we can protect your reputation and your customer’s financial security. Ultimately, we help you avoid disruption and chaos. \n\nOur singular focus is to help digital businesses thrive ensuring their data is safe and secure with an easy-to-deploy, easy-to-use account fraud detection and prevention platform. \n\nStart today with a free 14-day trial at www.verosint.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8d2d3085-9d28-4110-9f18-efa2ece68a95.png","url":"https://www.softwareadvice.ie/software/403157/verosint","@type":"ListItem"},{"name":"Haventec Authenticate","position":2,"description":"Introducing Haventec Authenticate, the next-generation authentication engine that offers easy accessibility, cost-effectiveness, standards-based integration, and superior security.\n\nHaventec Authenticate enables authentication solutions that include:\n\n1- Silent Multi-Factor Authentication (Silent MFA): Add an extra layer of security without changing how your customers sign-in. Silent MFA leverages cryptography and patented rolling (dynamic) keys as a second authentication factor.\n\n2- Passwordless Authentication: Haventec Authenticate eliminates the need for passwords, reducing the risk of security breaches due to weak or stolen passwords. With passwordless authentication, customers can access your system using a secure and convenient method, such as PIN or Biometric factors.\n\n3- Haventec Authenticate powers a CIAM as a Service solution that is passwordless and secure and includes identity and access management, customer data management, and more. With Haventec Authenticate CIAM, you can streamline your authentication processes and improve your security posture and customer experience.\n\nHaventec Authenticate offers a range of benefits, including:\n\nEasy implementation: Haventec Authenticate is easy to implement and our team of experts will work with you to ensure a smooth implementation process.\n\nCost-effectiveness: Haventec Authenticate is a cost-effective solution based on active users, saving your business money and effort during the build and run stages.\n\nStandards-based integration: Haventec Authenticate integrates seamlessly with your existing systems, ensuring that you can continue to use your current infrastructure.\n\nGranular user management: Haventec Authenticate allows granular user management through an intuitive admin console.\n\nIf you're interested in learning more about Haventec Authenticate and how it can help your business, contact us today for a free consultation. Our experienced team will work with you to understand your needs and provide a customised solution that meets your specific requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/883e7d12-d214-4f94-95ba-3034affff124.png","url":"https://www.softwareadvice.ie/software/400273/haventec-authenticate","@type":"ListItem"},{"name":"KYC Hub","position":3,"description":"Designed for businesses in real estate, banking, trading and other industries, KYC Hub is an identity verification platform that helps manage AML (anti-money laundering) screening, customer due diligence, financial crime compliance and more. Key features include artificial intelligence (AI), liveness detection, fraud detection, ID verification, audit trails and omnichannel support. It also provides customer support via chat, phone, FAQs, email and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9cee39f2-cfd7-4382-96e0-98af695d8dd2.png","url":"https://www.softwareadvice.ie/software/173287/kyc-and-aml","@type":"ListItem"},{"name":"TrustLogin","position":4,"description":"TrustLogin is a cloud-based solution that allows users to sign in to multiple cloud services using a single set of login credentials, eliminating the need for multiple usernames and passwords. This makes it easier for users to access their applications and improves security by reducing the risk of password-related security breaches.\n\nTrustLogin provides a centralized console for managing user identities and passwords across multiple cloud services. This allows administrators to easily add or remove users, reset passwords, and monitor user activity from a single location.\n\nTrustLogin also offers multi-factor authentication (MFA) capabilities, which add an extra layer of security to the login process. Users can authenticate using a variety of methods, including SMS, email, and mobile apps.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3743eaf5-eeda-433a-a9fb-2e345e098750.png","url":"https://www.softwareadvice.ie/software/393969/trustlogin","@type":"ListItem"},{"name":"Cyberelements","position":5,"description":"Designed for businesses of all sizes, Cyberelements is a cloud-based access management solution that helps analyze user behavior, enable multi-factor authentication, and detect suspicious activities. The platform lets administrators track and monitor various assets such as password vaults, videos, and more.\n\nThe tool allows executives to manage employees' identity information, gain insights into users' actions, detect changes in assets in real-time, and more. Key features include configurable workflow, third-party integrations, access controls/permissions, and workflow management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/90072e8d-8875-40ea-b7bf-f441b76860cc.jpeg","url":"https://www.softwareadvice.ie/software/419007/cyberelements","@type":"ListItem"},{"name":"Pathlock","position":6,"description":"Pathlock is a comprehensive cloud-based platform designed to help organizations secure, monitor, and automate their business application controls. Built for enterprises that run mission-critical systems such as SAP, Oracle, Workday, Salesforce, and other ERPs and SaaS applications, Pathlock Cloud enables security, compliance, and audit teams to gain end-to-end visibility and control over access, risks, and processes—all from a single, unified platform.\n\nAt its core, Pathlock helps organizations reduce risk exposure, enforce least privilege, and streamline compliance by combining Access Governance, Application Security, and Process Control Automation in one solution. Whether your company is managing complex SoD (Segregation of Duties) requirements, ensuring compliance with regulations like SOX, GDPR, HIPAA, or monitoring insider threats and fraud attempts, Pathlock offers the scale, intelligence, and automation to handle it efficiently.\n\nKey Capabilities\n\nAccess Governance & Risk Management: Automates provisioning, de-provisioning, and periodic user access reviews across cloud and on-premises applications, reducing manual overhead while enforcing least privilege.\n\nSegregation of Duties (SoD) & Compliance Monitoring: Continuously monitors access rights and user activity to detect and prevent SoD violations, insider threats, and regulatory non-compliance.\n\nAutomated Controls & Audit Readiness: Provides real-time dashboards and automated evidence collection to simplify external audits and internal risk assessments.\n\nCross-Application Security Visibility: Delivers centralized oversight across SAP, Oracle, Workday, Salesforce, and other critical apps, eliminating silos and blind spots in enterprise environments.\n\nProcess Controls & Transaction Monitoring: Identifies and flags unusual or high-risk business activities, such as fraudulent transactions or unauthorized changes in financial, HR, or supply chain processes.\n\nScalable Cloud Architecture: Designed for enterprises with large, complex IT landscapes, Pathlock supports millions of users, high-volume transactions, and global business units.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4673c70e-c10c-417b-b556-8a637e348e54.jpeg","url":"https://www.softwareadvice.ie/software/419600/pathlock","@type":"ListItem"},{"name":"ReachFive","position":7,"description":"ReachFive is an enterprise SaaS Customer Identity and Access Management (CIAM) platform, designed to build strong, trusted relationships with consumers. It connects brands and consumers via a unified, secure digital identity, enabling unique, personalized experiences at every touchpoint, fostering loyalty and driving sustainable growth.\n\nBuilt for modern customer journeys, ReachFive facilitates consistent omnichannel, multi-device interactions based on trust, convenience, and privacy control, giving users command over their data. We help businesses overcome fragmented data and siloed systems with a centralized, scalable hub for consumer identities.\n\nReachFive delivers comprehensive Customer Identity Management: full lifecycle control, flexible registration (forms, social logins, progressive profiling) for rich, unified 360-degree profiles. Self-service portals empower customers to manage profiles, preferences, and consents, aligning with global privacy regulations (including secure deletion).\n\nSecure access is paramount. ReachFive provides advanced authentication (MFA, OTPs/TOTPs) balancing robust security with seamless UX. MFA is flexibly implemented (e.g., risk-based, per user group, or default) to significantly reduce account takeover fraud without undue friction.\n\nAccess Governance & Consent Management are integral. ReachFive helps businesses define, implement, and audit policies for customer data access and platform functionalities. Customers get transparent control over privacy preferences and consents (data processing, marketing), aiding GDPR/CCPA compliance. We also securely govern third-party app access via OAuth 2.0, ensuring authorized and scoped sharing.\n\nAs a native cloud platform, ReachFive offers high performance, global availability, and scalability, managing millions of identities and high-volume transactions. It integrates easily into complex enterprise ecosystems via robust APIs, webhooks, and pre-built connectors, synchronizing identity data and orchestrating workflows with legacy/third-party systems (CRM, CDP, marketing tools). This makes customer identity data a valuable, actionable asset across your tech stack.\n\nReachFive serves customer-centric retailers & B2C companies (fashion, luxury, travel, media, QSR) prioritizing secure, exceptional CX. We engage CIOs, CTOs, CISOs, Digital/CX leaders, and Product Owners on tech strategy. For project success, ReachFive collaborates with strong consulting, integration, & technology partners for effective, on-time, on-budget deployment.\n\nBy choosing ReachFive, organizations enhance security, reduce fraud, streamline customer onboarding & engagement, build lasting brand trust, and unlock greater customer lifetime value through consistent, personalized omnichannel interactions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/795e28b5-9ad7-478b-8844-404bb1e7cbc7.png","url":"https://www.softwareadvice.ie/software/366511/reachfive","@type":"ListItem"},{"name":"Build38","position":8,"description":"Build38 is a cloud-based identity verification solution that helps organizations in the healthcare, financial services, mobile banking, digital, and mobility sectors onboard and authenticate new customers securely while complying with regulations like General Data Protection Regulation (GDPR), Anti-Money Laundering (AML), and Know-Your-customer (KYC).\n\nBuild38 provides authentication functionality through its app and web interfaces that help administrators verify customers' digital identities for legally valid identification. Users can also access databases from state-owned organizations.  \n\nBuild38 deploys through cloud-based software as a service. It provides support to help companies with onboarding, compliance, and technical questions. Build38 partners with an eIDAS-certified substantial service to offer verified identities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1acf2913-38c2-49dc-b876-28dde53a4410.png","url":"https://www.softwareadvice.ie/software/349471/build38","@type":"ListItem"},{"name":"Jira Oauth","position":9,"description":"Jira OAuth is a cloud-based platform that enables OAuth/OpenID Single Sign On (SSO) for Jira Software and Jira Service Desk. It is compatible with all OAuth/OpenID providers such as Google, Facebook, and more, allowing users from those providers to log in and register to Jira. The app provides a step-by-step guide to configure SSO between Jira and the OAuth/OpenID provider. User profile attributes like first name, last name, and email can be mapped from the OAuth/OpenID provider to Jira.\n\nAdditionally, it also allows user groups to be mapped, adding users to the appropriate Jira groups based on their group membership in the OAuth/OpenID provider. The platform also facilitates integration with other miniOrange apps such as Two Factor Authentication, SCIM Provisioning and API Token Authentication to provide an enhanced and secure Jira experience. Pricing is based on annual subscriptions and support is extended via chat, email, FAQs, phone and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/43149dfb-590c-4cb2-b09c-546864c52553.jpeg","url":"https://www.softwareadvice.ie/software/371327/jira-oauth","@type":"ListItem"},{"name":"BlockID","position":10,"description":"1Kosmos unifies identity proofing and passwordless authentication to empower workers, customers, and citizens, to access digital services securely and seamlessly. This means the users are much less likely to have their identity stolen, their accounts taken over, or fall victim to fraud. The BlockID platform is an authentication system that meets important security standards (NIST 800-63-3 via Kantara) and processes millions of these user verifications every day. Additionally, the solution is utilized by a variety of banks, telecommunications companies, and healthcare organizations around the world.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c19e3f67-19a1-4265-8ee0-10c66b3e4667.jpeg","url":"https://www.softwareadvice.ie/software/426460/blockid","@type":"ListItem"},{"name":"Zoho Directory","position":11,"description":"If you're looking for a secure workforce identity and access management (IAM) software, Zoho Directory is the solution for your business.\n\nCrafted for businesses of all sizes, ZD can manage user identities, assigned apps, and devices assigned to them in a central location. If you are already managing your identities through legacy directory management software, you can import all those accounts into ZD with Directory Stores.\n\nYou can start to secure your workforce identity by adding your users and assigning apps to them. These apps can be chosen from an array of 1000+ pre-integrated applications. ZD also allows you to add custom apps that you have built specifically for your business.\n\nLet's look at some of the key features of Zoho Directory\nSingle Sign-On (SSO) is available for apps, that allow users to access all apps with just a single password. User provisioning allows IT admins to assign apps to new users quickly without having to create individual user profiles in every app.\n\nWith Device Authentication for your desktops and laptops like Mac and Windows devices, you can assign and reassign devices along with resetting passwords for devices from Zoho Directory itself.\n\nSecurity Policies can be framed and enforced on users from ZD. Such a policy will ensure better password practices, implement Multi-Factor Authentication (MFA), restrict IPs, and manage login sessions, all combining to raise the level of security in the org.\n\n\nBenefits:\nIf your business runs on the cloud, with ZD, you can\n-Save employees from password fatigue and reduce time spent logging in with SSO and device authentication.\n\n-Help recruits gain day-one access to the org. resources and its apps & systems by automating user provisioning.\n\n-Ensure the security of your business by enforcing policies that suit your needs, layer passwords with Multi-Factor Authentication (MFA), and ensure additional verifications at logins.\n\n-IT admins can streamline and monitor the activities of users, applications, login activities, and MFA from a single location. It also helps the organization comply with regularization standards like SOC2 and ISO27001.\n\nIf your business has some legacy solutions and multiple identity sources,\n-you can 'one-click' import all your user accounts into ZD and begin accessing your cloud apps.\n-you can manage other directories from a single location with ZD.\n\nZoho Directory - 45-day trial is available. Monthly subscriptions start at just $2.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc36bf0e-aef7-421b-b2fb-dc5727962049.png","url":"https://www.softwareadvice.ie/software/427793/zoho-directory","@type":"ListItem"},{"name":"M365 Manager Plus","position":12,"description":"Designed for businesses in technology, consumer electronics, consulting and other industries, M365 Manager Plus is an IT management platform that helps streamline the administration and governance of the Microsoft 365 environment. The solution provides comprehensive management, reporting, and auditing capabilities for Microsoft 365. It enables administrators to gain visibility into user activities, monitor license usage, automate routine tasks, and ensure compliance. It also offers a variety of features such as advanced reporting, granular delegation, and security controls to help IT admins optimize their Microsoft 365 environment efficiently. Pricing is based on annual subscriptions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/885b2e45-0bc5-4634-adf3-0f4f2e61ba97.jpeg","url":"https://www.softwareadvice.ie/software/357494/m365-manager-plus","@type":"ListItem"},{"name":"Enso","position":13,"description":"Enso is an identity management software that helps to streamline and automate tasks associated with hardware preparation, access rights management, and licenses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3621988b-a164-42fa-a3b0-f0ac376ca279.png","url":"https://www.softwareadvice.ie/software/437373/enso","@type":"ListItem"},{"name":"Securden","position":14,"description":"Securden is an identity management software designed to help businesses of all sizes handle privileged accounts and passwords. The platform enables managers to consolidate details of servers and endpoints and manage approval workflows.\n\nAdministrators can define granular controls across applications to prevent malware propagation and track application elevation trends on a unified interface. Securden allows teams to detect new local administrator accounts and monitor users among local admin groups. Additionally, supervisors can perform audit trails to track activities and automatically change passwords after the selected duration. \n\nSecurden lets businesses integrate the system with several third-party applications including Active Directory to manage user onboarding and offboarding processes. Pricing is available on request and support is extended via phone, email and an online contact form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/73500acf-f725-4003-af0b-7fbe7d637c6a.png","url":"https://www.softwareadvice.ie/software/356908/securden","@type":"ListItem"},{"name":"PropelAuth","position":15,"description":"PropelAuth is a cloud-based identity and access management solution for software applications catering to software companies and developers building internal tools, customer portals, and partner integrations.\n\nPropelAuth offers key features like configurable roles and permissions, SAML and SCIM integration, full user management, and API key creation. Software teams can use PropelAuth to set up granular role-based access control, connect to identity providers via SAML, automate user provisioning with SCIM, create and manage users, and generate API keys for service accounts.\n\nPropelAuth’s pricing is based on the number of users, with volume discounts available for larger organizations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a144daa9-3153-472c-b506-244cea39c73a.jpeg","url":"https://www.softwareadvice.ie/software/401463/propelauth","@type":"ListItem"},{"name":"KYDSO","position":16,"description":"KYDSO is a cloud-based identity management solution that simplifies and secures the management of accounts within your IT landscape. With KYDSO, users can efficiently organize directory services to prevent security incidents and streamline audits. KYDSO also enables the centralized management of external employees and their identities, automating routine IT account tasks to enhance data quality and security while reducing employee workloads.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c78e7933-fa96-4d1d-96a5-cb1047114605.webp","url":"https://www.softwareadvice.ie/software/518801/KYDSO","@type":"ListItem"},{"name":"Cavelo Attack Surface Management","position":17,"description":"Cavelo is an attack surface management platform built for managed service providers (MSPs) that helps measure and protect the customers’ cybersecurity. It enables users to assess cyber risks and safeguard sensitive information.\n\nThe platform helps discover, organize and manage sensitive data in the clients’ environments, managing the risk of data breach. Cavelo assists with data, vulnerability and identity access management. It automatically finds and categorizes personal and proprietary data, keeps track of all devices and systems, reviews who has access to what data and addresses potential security risks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9084728-39e5-46b3-8752-a58c00f298d3.jpeg","url":"https://www.softwareadvice.ie/software/521046/Cavelo-Attack-Surface-Management","@type":"ListItem"},{"name":"Netwrix Identity Manager","position":18,"description":"Netwrix Usercube is an identity governance and administration (IGA) solution designed to automate, govern, and control enterprise identities. It is a software-as-a-service (SaaS) offering that caters to organizations across various industries seeking to enhance security, compliance, and productivity around user access management.\n\nThe solution ensures that users have the appropriate access to the necessary resources for the right duration. It enhances security and accountability by confirming that only authorized individuals can access the required resources. Netwrix Usercube also empowers business owners, not just IT staff, to grant access to users through a convenient access request portal, streamlining the process.\n\nThe solution secures an organization's data by quickly removing access for employees who have left the company. Additionally, Netwrix Usercube provides automated attestation campaigns and compliance reports that offer a comprehensive view of who has access to what, and why. These features are designed to assist organizations in meeting their compliance requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8541a8c5-03b3-4acd-bf5b-ef09d7acefa0.png","url":"https://www.softwareadvice.ie/software/521562/Netwrix-Usercube","@type":"ListItem"},{"name":"swIDch PLC-OTAC","position":19,"description":"swIDch PLC-OTAC is a multi-factor authentication solution that utilizes dynamic one-time authentication codes to increase security for manufacturers and operators. Unlike traditional password-based systems, PLC-OTAC neutralizes vulnerabilities such as default passwords, password sharing, and password cracking. It provides a dynamic, non-reusable authentication code for each login.\n\nThe PLC-OTAC solution is customizable and supports various authentication code lengths and issuance mediums such as smartphones or display cards. This flexibility allows for integration into each company's unique environment. PLC-OTAC maintains the existing user experience and interface of the PLC system. This standardizes the authentication process without the need for extensive technical expertise or training.\n\nA key feature of swIDch PLC-OTAC is its uni-directional authentication capability. It does not require a network environment. This provides a secure authentication solution tailored for industrial control systems and operational technology environments. It resolves common security challenges in these settings. Manufacturers and operators can improve productivity and efficiency by enhancing user authentication without additional hardware or network changes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f1636a10-3fc6-4ed1-934b-deed526c66f7.jpeg","url":"https://www.softwareadvice.ie/software/523048/swIDch-PLC-OTAC","@type":"ListItem"},{"name":"SecureAuth CIAM","position":20,"description":"SecureAuth CIAM is a customer identity and access management solution. It enables businesses to provide a simple, secure, and seamless customer experience. The solution caters to a range of industries, such as financial services, healthcare, and retail. It helps organizations scale their customer identity and access management needs.\n\nSecureAuth CIAM offers flexible, adaptive, and continuous authentication options to secure customer accounts. It provides passwordless and biometric authentication methods. This reduces friction for customers, ensuring a smooth login experience. The solution also features delegated administration with intuitive user interfaces, allowing easy configuration and management.\n\nThe solution's capabilities include building trust and brand loyalty with a unified experience across web and mobile applications. SecureAuth CIAM also helps lower the burden of administration, maintenance, and professional services. This makes it an efficient choice for businesses looking to enhance their customer identity and access management strategies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/49946eac-5bb6-47fe-8e8b-71a64bab640a.png","url":"https://www.softwareadvice.ie/software/527035/SecureAuth-CIAM","@type":"ListItem"},{"name":"Melapress Login Security","position":21,"description":"Melapress Login Security is a WordPress plugin that helps website administrators enhance the security of their websites. The plugin enables them to set strong password requirements, limit failed login attempts and change the WordPress login URL.\n\nThe plugin caters to a wide range of WordPress websites, from small businesses to large enterprises, that prioritize online security. Website administrators can set password policies by user role or site-wide, ensuring all users follow best practices for password security. The plugin also limits login attempts and automatically blocks users with failed logins, protecting against password and dictionary attacks.\n\nAnother feature of Melapress Login Security is the ability to change the WordPress login URL. This step helps website owners fight off random automated attacks, scans, and brute force attacks, making it more difficult for malicious actors to access the website. The plugin also includes device recognition alerts, which notify users whenever a login is detected from an unrecognized device, allowing them to secure their account. Additionally, the plugin limits the number of different IP addresses from which users can log in, preventing account sharing and unauthorized access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96feb3bb-847b-424c-8fb9-5889af0c44f6.png","url":"https://www.softwareadvice.ie/software/527086/Melapress-Login-Security","@type":"ListItem"},{"name":"Tecalis Authentication","position":22,"description":"Tecalis Authentication is a multi-factor authentication solution that combines biometrics features to provide security and easy access. It adheres to regulatory standards such as SCA (Strong Customer Authentication) and PSD2 compliance.\n\nTecalis Authentication integrates with the business's identity verification service. Key features include one-time passwords, email, SMS, facial biometrics, PIN, fingerprint, database and social login. The system also features anti-spoofing controls. These prevent fraud, such as protection against deepfakes, login warnings on new devices and access levels based on the type of login.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c8346a48-e648-4d69-b005-cdb791f65b55.png","url":"https://www.softwareadvice.ie/software/528733/Tecalis-Authentication","@type":"ListItem"},{"name":"QDesk","position":23,"description":"QDesk is an end-user access management platform designed to simplify privilege management through identity verification, temporary access elevation, and automated password resets. It supports IT departments and managed service providers in improving helpdesk security, productivity, and compliance while adhering to Zero Trust principles.\n\nThe platform includes temporary admin access features that enforce least privilege policies using time-based elevation and process-specific permissions. Identity verification methods include SMS codes, email verification, mobile app notifications, and Microsoft Authenticator. A built-in rules engine allows organizations to save elevation request templates for automatic future approvals, reducing manual intervention while maintaining security.\n\nQDesk centralizes account management for Active Directory, Microsoft 365/Entra ID, and local Windows accounts within a single interface. It enables technicians to reset passwords, unlock accounts, manage user access, and monitor account status without requiring extensive administrative privileges. Permissions automatically revert to standard access after each elevated session, reducing security risks associated with prolonged administrative rights.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c7ad4f5b-ec5c-46b3-a1c3-f5cb692801ed.png","url":"https://www.softwareadvice.ie/software/518249/QDesk","@type":"ListItem"},{"name":"Scalefusion OneIdP","position":24,"description":"OneIdP is a solution that enables secure access for users and devices. The solution uses a zero trust model. It grants access based on device compliance. This ensures only trusted and managed devices can access corporate resources.\n\nOneIdP integrates with the Scalefusion Unified Endpoint Management (UEM) platform. The UEM-driven zero trust approach combines user authentication with real-time device validation. It continuously evaluates access permissions based on the security posture of the device. OneIdP also supports SAML-based single sign-on (SSO) to corporate applications. \n\nOneIdP enforces conditional access policies to further strengthen security. It ensures that only compliant managed devices can access critical applications and data. For unmanaged devices, it supports multi-factor authentication.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96b510a5-4d21-4540-b0ea-d9e98913407c.png","url":"https://www.softwareadvice.ie/software/530037/OneIdP","@type":"ListItem"},{"name":"Mumba Access","position":25,"description":"Mumba Access is a SaaS solution that enables business leaders to carry out any strategic, tactical or operational initiatives that involve the whole workforce.\n\nMumba Access includes two key products: Mumba IAM and Mumba Front Door. \n\nMumba IAM  is the only Identity Management Access product focused solely on the deskless workforce. \n\nThis is done in combination with Mumba Front Door, delivering a singular APP experience perfect for mobile devices - and also works beautifully within browsers for the office...\n\nToday, there are few reliable ways for business leaders to reach their deskless workers (think email, SMS, posters, and word of mouth).\n\nThis lack of connection leads to shallow levels of employee engagement and, at worst, a lack of capability to deal with critical, operational and social business issues.\n\nThe solution delivers a one-stop-shop app on each person's phone, creating a direct connection to the business and letting senior executives carry out all types of initiatives that require the participation of the whole workforce.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c2458cf0-15d8-4c80-8d07-8c165756dfa5.png","url":"https://www.softwareadvice.ie/software/459338/Mumba-Cloud","@type":"ListItem"}],"numberOfItems":25}
</script>
