πŸ“‹

Identity-Centric Security

Compare 24 identity-centric security tools to find the right one for your needs

πŸ”§ Tools

Compare and find the best identity-centric security for your needs

StrongDM

The People-First Access Platform.

Provides Zero Trust privileged access to any database, server, or Kubernetes cluster.

View tool details β†’

Teleport

The easiest, most secure way to access all your infrastructure.

An identity-native infrastructure access platform for engineers and machines.

View tool details β†’

Twingate

The most secure way to provide remote access.

A modern, software-defined perimeter solution for Zero Trust Network Access.

View tool details β†’

HashiCorp Vault

Secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys.

Provides secrets management, encryption as a service, and privileged access management.

View tool details β†’

Appgate SDP

The industry’s most comprehensive Zero Trust Network Access solution.

Provides secure, 1-to-1 connections between users and resources based on identity.

View tool details β†’

Keeper Security

Cybersecurity starts with password security.

Provides a zero-trust and zero-knowledge platform for password and privileged access management.

View tool details β†’

CyberArk Identity Security Platform

The global leader in Identity Security.

Secures human and machine identities from end-to-end.

View tool details β†’

BeyondTrust

The Worldwide Leader In Privileged Access Management.

Provides a platform to secure and manage privileges across any environment.

View tool details β†’

Zscaler Private Access (ZPA)

The world's largest inline cloud security platform.

Provides secure, zero trust access to private applications for authorized users.

View tool details β†’

Cloudflare Zero Trust

Secure your workforce, systems, and data without a VPN.

A comprehensive SASE platform to secure users, applications, and data.

View tool details β†’

JumpCloud Open Directory Platform

Make Work Happen.

A cloud directory platform to manage users, devices, and access from a single pane of glass.

View tool details β†’

ManageEngine PAM360

Complete privileged access security for your enterprise.

A comprehensive solution for privileged access management (PAM).

View tool details β†’

Illumio

The Zero Trust Segmentation Company.

Provides micro-segmentation to stop the spread of breaches and ransomware.

View tool details β†’

Okta Identity Cloud

The World's #1 Identity Platform.

Provides secure identity management and single sign-on to any application.

View tool details β†’

Delinea

Seamless Privileged Access Management.

Provides PAM solutions for the modern, hybrid enterprise.

View tool details β†’

Palo Alto Networks Prisma Access

The industry's most complete cloud-delivered security platform.

Provides ZTNA 2.0, securing all users and all applications with best-in-class security.

View tool details β†’

Microsoft Entra ID

Secure access for a connected world.

Microsoft's cloud identity and access management solution.

View tool details β†’

Saviynt

The Identity Cloud.

Provides an intelligent, cloud-native platform for identity governance and security.

View tool details β†’

Cisco Secure Access

Simpler to connect, simpler to secure.

Cisco's cloud-delivered SSE solution for secure, seamless access.

View tool details β†’

One Identity

Unified Identity Security.

Offers a unified platform for identity governance, privileged access, and access management.

View tool details β†’

SailPoint Identity Security Cloud

The Leader in Identity Security.

An AI-powered cloud identity platform that provides a foundation for Zero Trust.

View tool details β†’

Ping Identity

Intelligent Identity for the Enterprise.

Provides comprehensive identity and access management for workforce and customers.

View tool details β†’

Forcepoint ONE

The all-in-one, cloud-native security platform.

A unified platform for SSE, combining ZTNA, SWG, and CASB.

View tool details β†’

IBM Security Verify

AI-powered, cloud-native, single sign-on (SSO) solution.

Provides deep context for risk-based authentication and adaptive access.

View tool details β†’