This subcategory includes tools that define, enforce, and audit access policies to ensure users have appropriate permissions based on roles and responsibilities.
24 products
auth0.com/docs/extensions/authorization-extension
aws.amazon.com/iam
azure.microsoft.com/en-us/services/active-directory
azure.microsoft.com/en-us/services/active-directory/role-based-access-control
beyondtrust.com/privileged-access-management
centrify.com/products/privileged-access-service
cyberark.com/products/identity-security
cyberark.com/products/privileged-access-security
cloud.google.com/iam
ibm.com/security/software/identity-governance
ibm.com/security/verify-access
ibm.com/security/verify-governance
azure.microsoft.com/en-us/services/active-directory/privileged-identity-management
azure.microsoft.com/en-us/services/role-based-access-control
okta.com/products/access-gateway
okta.com/products/authorization-server
oneidentity.com/products/identity-manager
oracle.com/security/cloud-security/identity-cloud.html
pingidentity.com/products/pingcloud
pingidentity.com/products/pingaccess
pingidentity.com/products/pingone-for-customers
sailpoint.com/products/identitynow
saviynt.com/products/cloud-identity-governance
saviynt.com/products/enterprise-identity-cloud
Powered by comprehensive SaaS market data