---
description: Discover the best Access Governance Software for your organisation. Compare top Access Governance Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Access Governance Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Access Governance Software](https://www.softwareadvice.com.au/directory/4665/access-governance/software)

# Access Governance Software

Canonical: https://www.softwareadvice.com.au/directory/4665/access-governance/software

Page: 1 / 5\
Next: [Next page](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=2)

-----

## Products

1. [FusionAuth](https://www.softwareadvice.com.au/software/148228/fusionauth) — 4.8/5 (30 reviews) — FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challe...
2. [Heimdal Privileged Access Management](https://www.softwareadvice.com.au/software/242915/heimdal-privileged-access-management) — 4.6/5 (22 reviews) — Heimdal Privileged Access Management is a PAM solution designed to simplify and segment the management of admin right...
3. [ManageEngine ADManager Plus](https://www.softwareadvice.com.au/software/361323/manageengine-admanager-plus) — 4.5/5 (83 reviews) — ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD managem...
4. [ManageEngine AD360](https://www.softwareadvice.com.au/software/370056/manageengine-ad360) — 4.6/5 (34 reviews) — ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and ...
5. [Rippling](https://www.softwareadvice.com.au/software/410674/rippling) — 4.9/5 (4616 reviews) — Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operatio...
6. [Okta](https://www.softwareadvice.com.au/software/419181/okta) — 4.7/5 (930 reviews) — Okta is a workforce identity management platform designed to provide centralized access control and user administrati...
7. [Cisco Duo](https://www.softwareadvice.com.au/software/430527/duo-security) — 4.7/5 (548 reviews) — Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any use...
8. [JumpCloud Directory Platform](https://www.softwareadvice.com.au/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (264 reviews) — JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or ...
9. [Auth0](https://www.softwareadvice.com.au/software/107607/auth0) — 4.7/5 (138 reviews) — Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any applicati...
10. [Citrix Workspace](https://www.softwareadvice.com.au/software/240765/citrix-workspace) — 4.2/5 (121 reviews) — Citrix Workspace is a content collaboration software designed to help businesses in the IT sector deploy remote appli...
11. [OneLogin](https://www.softwareadvice.com.au/software/143308/onelogin) — 4.6/5 (92 reviews) — OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web ...
12. [ManageEngine ADAudit Plus](https://www.softwareadvice.com.au/software/361342/manageengine-adaudit-plus) — 4.4/5 (72 reviews) — ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensiv...
13. [tenfold](https://www.softwareadvice.com.au/software/404732/tenfold) — 4.5/5 (66 reviews) — No-Code Identity Governance \&amp; Administration with faster time to value. We ensure the right people have access to...
14. [Orchestry Software](https://www.softwareadvice.com.au/software/383321/orchestry-software) — 4.9/5 (64 reviews) — Orchestry is a well-balanced SaaS platform created by Microsoft 365 MVPs with end-users in mind for IT Administrators...
15. [B-Line](https://www.softwareadvice.com.au/software/374355/b-line) — 4.7/5 (48 reviews) — B-Line is a flexible workplace management and security platform that helps employers and asset managers manage their ...
16. [Conecta Suite](https://www.softwareadvice.com.au/software/366554/conecta-suite) — 4.9/5 (47 reviews) — Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team pr...
17. [SecureW2 JoinNow Platform](https://www.softwareadvice.com.au/software/522522/JoinNow-Cloud-RADIUS) — 4.8/5 (45 reviews) — JoinNow Cloud RADIUS eliminates the risks of legacy protocols and credential theft with a cloud-native solution built...
18. [NordPass Business](https://www.softwareadvice.com.au/software/405360/nordpass-business) — 4.5/5 (39 reviews) — NordPass Business — The Ultimate Password Manager for Your Organization. Trusted by businesses worldwide, NordPass Bu...
19. [Ping Identity](https://www.softwareadvice.com.au/software/150649/pingidentity) — 4.7/5 (39 reviews) — At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise...
20. [miniOrange](https://www.softwareadvice.com.au/software/342508/single-sign-on) — 4.5/5 (36 reviews) — The simplest platform which integrates thousands of applications with convenient features such as SSO, MFA, Provision...
21. [Avatier Identity Anywhere](https://www.softwareadvice.com.au/software/177628/avatier) — 4.9/5 (35 reviews) — Avatier Identity Anywhere is a cloud-based identity management solution designed to help businesses manage their empl...
22. [Passbolt](https://www.softwareadvice.com.au/software/450980/passbolt) — 4.7/5 (35 reviews) — Passbolt is the open-source password manager designed with team needs in mind, simplifying password management for or...
23. [SAP Access Control](https://www.softwareadvice.com.au/software/233830/sap-access-control) — 4.5/5 (32 reviews) — SAP Access Control is an access management software designed to help businesses across various industry verticals, in...
24. [Symantec VIP](https://www.softwareadvice.com.au/software/295157/symantec-vip) — 4.7/5 (27 reviews) — Symantec VIP is an identity management software that helps organizations to manage and protect their online identitie...
25. [Zluri](https://www.softwareadvice.com.au/software/413652/zluri) — 4.9/5 (27 reviews) — Zluri is a data-driven enterprise SaaS management platform that facilitates discovery, management, optimization, and ...

-----

Page: 1 / 5\
Next: [Next page](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=2)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)
- [Privileged Access Management Software](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.com.au/directory/4311/authentication/software)
- [Network Access Control (NAC) Software](https://www.softwareadvice.com.au/directory/4433/network-access-control/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.com.au/directory/4427/ciam/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/4665/access-governance/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4665/access-governance/software> |
| en | <https://www.softwareadvice.com/access-governance/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4665/access-governance/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4665/access-governance/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4665/access-governance/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4665/access-governance/software> |
| fr | <https://www.softwareadvice.fr/directory/4665/access-governance/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@id":"https://www.softwareadvice.com.au/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Access Governance Software","description":"Discover the best Access Governance Software for your organisation. Compare top Access Governance Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/4665/access-governance/software","about":{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software#breadcrumblist"},"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software#itemlist"},"publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Access Governance Software","position":2,"item":"https://www.softwareadvice.com.au/directory/4665/access-governance/software","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Best Access Governance Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software#itemlist","@type":"ItemList","itemListElement":[{"name":"FusionAuth","position":1,"description":"FusionAuth is a customer identity and access management (CIAM) platform specifically engineered to address the challenges of security, scalability, and developer efficiency. This solution is designed for organizations seeking to enhance their identity management processes while ensuring compliance with stringent regulatory standards such as GDPR and SOC2. By offering a flexible deployment model, FusionAuth allows users to maintain control over their data residency, whether in the cloud, on-premises, or in hybrid environments.\n\nTargeted towards developers and organizations that require robust identity solutions, FusionAuth is particularly beneficial for businesses experiencing rapid growth or those that need to streamline their authentication processes. Its API-first architecture enables organizations to embed identity management directly into their existing workflows, reducing the operational burden associated with traditional identity providers. This capability is especially valuable for companies that wish to eliminate the complexities and costs associated with maintaining homegrown authentication systems.\n\nKey features of FusionAuth include its flexible deployment options, which empower organizations to choose how and where they host their identity management solution. This flexibility is complemented by an API-driven architecture, where every feature is accessible through APIs, allowing for seamless integration and management of identity as part of the overall infrastructure. This approach not only enhances developer velocity but also ensures that organizations can adapt their identity solutions to meet evolving business needs without being locked into a single vendor's cloud.\n\nAdditionally, FusionAuth offers predictable pricing models that help organizations avoid unexpected costs commonly associated with monthly active user (MAU) surges. This transparency in pricing is a significant advantage for businesses looking to scale without incurring excessive expenses. The platform has demonstrated its effectiveness across various industries, with notable success stories highlighting its ability to handle massive traffic surges, reduce operational bottlenecks, and lower engineering burdens.\n\nFor instance, Bilt leveraged FusionAuth to manage high traffic volumes while ensuring compliance with data residency requirements. Similarly, Vatix transitioned from a cumbersome homegrown system to FusionAuth, enabling their Customer Success team to onboard clients quickly and efficiently. UrbanSitter's implementation of FusionAuth significantly reduced their authentication development time, allowing them to focus on core product innovation. These examples illustrate how FusionAuth not only enhances security and compliance but also drives operational efficiency and cost savings for organizations across diverse sectors.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c9a84fb-bd66-457c-b4c3-e15a64673820.png","url":"https://www.softwareadvice.com.au/software/148228/fusionauth","@type":"ListItem"},{"name":"Heimdal Privileged Access Management","position":2,"description":"Heimdal Privileged Access Management is a PAM solution designed to simplify and segment the management of admin rights within an enterprise network. It ensures the proper enforcement of the principle of least privilege, which entails that user accounts operating within a system not be granted more permissions than they need to perform their daily duties. \nBy using Heimdal Privileged Access Management within your company, you can address three major needs within your company. First of all, our PAM solution is built to help any organizations achieve true access governance that is seamlessly implemented in their modern IT infrastructure. \nGartner has ranked privileged access management as the number one priority for businesses for the last three years. Therefore, managing admin rights is not only a way to save time and boost productivity, but also enhance your company’s cybersecurity. \nSecondly, Heimdal Privileged Access Management within can save sysadmins a lot of valuable time and resources. It allows them to manage all user requests in one handy place, either in the dedicated dashboard tab or on the go with the mobile app. From there, your IT administrators can view and manage escalation queries, as well as approve or deny them automatically or on a case by case basis. \nThirdly and finally, Heimdal Privileged Access Management can easily be integrated with any other Heimdal Security product. This gives it new and improved capabilities and creates a streamlined cybersecurity environment where all the moving parts that go into your enterprise protection move together in unison. \nWhen coupled with an endpoint detection solution, Heimdal Privileged Access Management becomes the only PAM solution on the market to provide automatic de-escalation of admin rights on the infected account. This stops the spread of any malicious code in your corporate network and actively prevents advanced cyberattacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46d0bfcb-37c2-4191-8a34-dc3ca3bc249b.png","url":"https://www.softwareadvice.com.au/software/242915/heimdal-privileged-access-management","@type":"ListItem"},{"name":"ManageEngine ADManager Plus","position":3,"description":"ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD management and reporting tasks with ease. Its all-inclusive reports for diverse AD functionalities play a vital role in data-driven decision-making. ADManager Plus also has risk assessment indicators that monitor your organization's AD environment for potential risks, risk exposure management to view potential attack paths that could leave your privileged entities vulnerable, and access certification campaigns to review user access regularly.\nIt seamlessly integrates with leading ITSM, SIEM, and HCM solutions and other third-party applications using custom APIs to enhance the scalability of IT resource management, improve the efficiency of administrative tasks, and provide consistency while handling enterprise data.\nADManager Plus offers the option to back up your data and restore it when required, preventing data loss.\nIts core features include:\n\nUser provisioning\nManage user identities and access privileges throughout the user's life span in an organization. Create accounts in AD, Microsoft 365, and Google Workspace and carry out other management tasks like password resets, account unlocks, and template-based account updates.\n\nRisk assessment\nIdentify potential security risks of your AD using a risk score indicator. Prompt decisions based on it can help mitigate the identified risks and take the security of the organization up a notch.\n\nRisk exposure management\nVisualize potential attack paths that hackers could exploit to gain access to your AD privileged entities and view required remediation measures to secure them.\n\nAccess certification campaign\nReview the user privileges using periodic audit campaigns to ensure their access is authorized and appropriate. This helps your organization follow the principle of least privilege so that admins can have better control of user access.\n\nReport management\nADManager Plus offers more than 200 prepackaged reports on objects such as users, computers, groups, OUs, and more, plus custom reports with advanced filters, ensuring admins have crucial information at their fingertips. They can carry out tasks by utilizing the in-line management actions available in the report.\n\nWorkflow\nAdmins can define workflow agents like requester, reviewer, approver and executor for every AD management action performed using ADManager Plus. Configure SLAs to ensure the timely execution of tasks by sending frequent notifications, changing priority, and reassigning requests.\n\nDelegation\nEquip non-admin users to execute routine AD administrative tasks by assigning them custom help desk roles, balancing the workload of IT admins.\n\nAutomation\nEliminate manual AD tasks by automating them to be executed at specified time intervals. For critical tasks, implement a business workflow so that the automation is supervised.\n\nOrchestration\nPerform event-driven management actions using predefined templates. Integrate HCM applications with ADManager Plus to activate bidirectional data sync between HCM applications and AD using webhooks.\n\nIntegration\nIntegrate with third-party applications using REST APIs and webhooks. Various ITSM, SIEM, and HCM tools can be integrated with ADManager Plus for centralized management and meeting compliance audit needs.\n\nBackup and recovery\nPrevent and manage data loss by periodically backing up AD, Google Workspace, and Microsoft Entra ID and recovering it when required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/28958cda-088c-4757-b48b-8054d0ef96d9.png","url":"https://www.softwareadvice.com.au/software/361323/manageengine-admanager-plus","@type":"ListItem"},{"name":"ManageEngine AD360","position":4,"description":"ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and secure user identities, facilitate identity governance, and ensure compliance. It provides in-depth access management for Microsoft Active Directory, M 365, G Suite, and other target systems. Its key capabilities include adaptive authentication, auditing, compliance, identity lifecycle management, actionable reporting, user behavior analytics (UBA), multi-factor authentication (MFA), and single sign-on (SSO). \n\nAutomated A360 facilitates identity lifecycle management by automating routine tasks such as user provisioning, modification, deprovisioning, and other administrative tasks across target systems such as Active Directory, Microsoft 365 and Exchange Server. This helps eliminate errors and redundancies introduced by humans and enhances productivity. \n\nIts actionable reporting and ML powered UBA employs user-behavior analytics, powered by machine learning (ML) algorithms to detect anomalies in user behavior and provides intelligent threat alerts. This provides advanced security insights with precision, and helps prevent false alarms. UBA also provides instant alerts to administrators when unusual logon activity, privilege escalation, and other anomalous behavior are detected. \n\nManageEngine AD360 provides administrators with real-time audit reports and alerts on critical changes made to Active Directory and Azure Active Directory environments. It also allows administrators to monitor and analyze logon activities, lockouts, and password changes to help ensure regulatory compliance. It also provides reports for IT regulatory mandates such GDPR, SOX, PCI, HIPAA, FISMA, and GLBA, to streamline compliance management and prevent regulatory risks.\n \nIts identity analytics and reporting features help users perform risk-based adaptive authentication using identity analytics tools that exploit big data, machine learning (ML), and artificial intelligence (AI) technologies to ensure accuracy and mitigate identity-related risks. Risk-based adaptive authentication is performed using several factors such as user location, IP address, time of previous logon, and device footprint to detect and remove excessive user privileges, monitor privileged accounts, and to detect separation of duty (SOD) violations. \n\nManageEngine AD360 provides contextual multi-factor authentication methods, to extend an additional layer of security and curb identity-related attacks. A wide range of authentication methods including SMS verification, biometric verification, Google authenticator, and RADIUS are supported. Besides MFA, AD360 supports single sign-on (SSO) across SAML based applications. Risk-based adaptive authentication is performed using several factors such as user location, IP address, time of previous logon, and device footprint. This is crucial for detecting and removing excessive user privileges, monitoring privileged accounts, and detecting separation of duty (SOD) violations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6be9101b-2d31-46ec-97f0-29fcb80874e7.jpeg","url":"https://www.softwareadvice.com.au/software/370056/manageengine-ad360","@type":"ListItem"},{"name":"Rippling","position":5,"description":"Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operations. It centralizes employee data and automates tasks, offering features such as workflow studio for automation, reporting analytics, automated policies, and permissions management. Rippling provides specialized suites for various needs: Rippling HR manages the employee lifecycle, Rippling Payroll automates payments and direct deposits, IT tools enhance IT security with identity and device management, and the Finance suite integrates corporate cards, expenses, and accounts payable automatically. It also supports global compliance for onboarding and management across countries. Rippling is an all-in-one platform that offers a wide range of features to streamline HR operations, enhance security measures, automate payroll processes and control company costs. With its focus on scalability, security, automation and cost management, Rippling empowers businesses to optimize their workforce operations, reduce risks and achieve operational efficiency across their organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7ec57690-a46d-4978-83cf-a6f85c097649.png","url":"https://www.softwareadvice.com.au/software/410674/rippling","@type":"ListItem"},{"name":"Okta","position":6,"description":"Okta is a workforce identity management platform designed to provide centralized access control and user administration for employees and work partners. It supports organizations in securing their workforce while managing access to various business applications and systems.\n\nThe platform includes features such as pre-built integrations to connect with existing business technologies. It offers centralized management of users, groups, and devices through a single interface. Automated onboarding and offboarding capabilities enable administrators to efficiently manage user access with minimal manual effort.\n\nOkta is used by organizations across different industries for identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37d97abb-49dc-4a9f-a027-0925c44e3c6b.png","url":"https://www.softwareadvice.com.au/software/419181/okta","@type":"ListItem"},{"name":"Cisco Duo","position":7,"description":"Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem.  \n\nDuo verifies users' identities and establishes device trust in any IT and security environment: \n\n- Multi-cloud, hybrid, and on-premises application support \n\n- Diverse mix of operating systems and deep integrations with leading technology providers \n\n- Unique use cases including supporting homegrown and legacy apps, securing third-party devices, and protecting Winlogon and RDP \n\nPaired with deep insights into users’ devices, Duo gives you the policies and control to manage access based on endpoint health or user risk level which can change between authentication attempts. By providing simple, seamless end user and administrator experiences, Duo dramatically reduces your total cost of ownership. \n\nDuo Continuous Identity Security combines Cisco Identity Intelligence with Duo Passport to stop identity-based threats and boost workforce productivity. Cisco Identity Intelligence provides visibility across your identity sources into multi-factor authentication (MFA) usage, admin controls, unmanaged device access, inactive or dormant accounts, excessive permissions, and more.  Duo Passport eliminates MFA fatigue by minimizing authentication requests and friction in trusted scenarios throughout the workday. After login, Duo continually evaluates trust for every access request and doesn’t prompt users again for authentication if the context remains the same. \n\nPrior to granting access to critical resources, Duo verifies users’ identities with strong MFA. Duo passwordless and single sign-on (SSO) build on MFA to verify user identity with authentication tools like biometrics, FIDO2 security keys, and push notifications from the Duo Mobile app. \n\nWhile establishing user trust is essential, you also need to have trust in the devices accessing applications on your network. Duo’s device trust tools deliver visibility into devices, assess their security posture, and continuously verify trust to allow or block access. \n\n- Duo Device Insight inventories every endpoint and provides data on OS, platform, browser and plugin versions, including passcode, screen lock, full disk encryption, and rooted/jailbroken status. Easily search, filter, and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest vulnerabilities. \n\n- Duo Desktop, a native client app for macOS, Windows, and ChromeOS, enables you to enforce corporate device health policies such as checking OS version and patch level, password and firewall status, AV agent enabled, disk encryption, and management status.  \n\n- Self-remediation enables you to block non-compliant devices at the point of authentication and empower users to bring devices back into compliance without contacting IT. Automatically notify users of outdated devices with direct links to update to the latest software version. Provide a grace period before application access is blocked, or block immediately with permissions reinstated once the device has been updated.  \n\n- Duo Trusted Endpoints helps you define and manage trust for every endpoint, whether managed or unmanaged, company-issued, contractor-owned, or personal Bring-Your-Own-Device (BYOD). Create your own inventory of trusted devices with the option to add and remove devices, include a description, set a trust expiration date, and more.  \n\nDuo bundles basic support with every subscription purchase. Duo Quick Start provides 60 days of expert advice from our trusted deployment advisors. With Duo Care, our premium support service, you'll work with a team of Duo experts who will guide you through the life of your subscription to help you maximize the value of your Duo investment as your organization and business needs evolves.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1c054704-dda9-4998-a805-b9fa3169766b.png","url":"https://www.softwareadvice.com.au/software/430527/duo-security","@type":"ListItem"},{"name":"JumpCloud Directory Platform","position":8,"description":"JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provides a centralized identity, which allows administrators to manage system security policies, multi-factor authentication processes, and public SSH keys.\n\n\nProfessionals can utilize its self-service portal to execute commands across multiple servers, control file storage infrastructure, and manage users as an individual or as part of groups. JumpCloud Directory-as-a-Service provides single sign-on functionality to access various applications including Slack, Zendesk, Meraki, GitHub, Dropbox, and more. Additionally, enables managers to monitor employees’ activities across multiple endpoints.\n\n\nJumpCloud Directory-as-a-Service offers an application programming interface (API), which lets businesses integrate the system with several third-party applications such as G-Suite, Azure Active Directory, Workday, and more. Pricing is based on monthly and annual subscriptions and support is extended via FAQs, knowledgebase, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7818866c-4066-4078-ba1a-03c0e105f11d.png","url":"https://www.softwareadvice.com.au/software/180508/jumpcloud-directory-as-a-service","@type":"ListItem"},{"name":"Auth0","position":9,"description":"Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is a highly customizable product that is as simple as development teams want, and as flexible as they need. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1727a37-7505-40cf-896e-edf3a2a4583e.png","url":"https://www.softwareadvice.com.au/software/107607/auth0","@type":"ListItem"},{"name":"Citrix Workspace","position":10,"description":"Citrix Workspace is a content collaboration software designed to help businesses in the IT sector deploy remote applications and facilitate unified endpoint management across devices. The platform enables administrators to share files and collaborate on documents with stakeholders in a centralized dashboard.\n\nManagers can detect and resolve security threats and gain insights into behavior analytics to prevent performance-related issues. Citrix Workspace allows teams to securely access company data using multi-factor authentication (MFA) and single sign-on (SSO). Additionally, operators can also capture eSign and track revisions or reviews across documents in real-time. \n\nCitrix Workspace offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including Jira, Microsoft Power BI, Salesforce, SAP Concur, Zendesk, ServiceNow, Workday and Tableau. Pricing is based on monthly subscriptions and support is extended via phone, forum, knowledge base, live chat, FAQs and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2da47670-0793-4133-ab08-c14d17d21d2f.png","url":"https://www.softwareadvice.com.au/software/240765/citrix-workspace","@type":"ListItem"},{"name":"OneLogin","position":11,"description":"OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web applications, data centers, cloud storage and more. Key features include single sign-on, web access management, adaptive and multi-factor authentication and mobile identity tracking.\n\n\nOneLogin’s web access management tool integrates with the existing web servers and helps businesses secure their web applications. Its adaptive authentication feature uses machine learning to determine the kind of security access that users need to fill in order to access the system. The solution uses a multi-factor authentication system that validates users’ identity through standard user ID and passwords along with one-time passwords (OTP) shared via mobile app and text messages, Duo Security, RSA and more.\n\n\nOneLogin is available on a per user per month subscription basis. Support is offered via phone, email and an online knowledge repository. The solution is used in a variety of businesses including education, energy, manufacturing, government, finance and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/920aaefd-244a-4931-8332-43973d59fe68.png","url":"https://www.softwareadvice.com.au/software/143308/onelogin","@type":"ListItem"},{"name":"ManageEngine ADAudit Plus","position":12,"description":"ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensive logon auditing, detailed change monitoring, real-time risk alerting, and streamlined compliance reporting for Active Directory, Azure AD, file servers, Windows servers and workstations.  It helps users monitor and generate real-time change audit reports on Active Directory objects such as users, computers, groups, organizational units and more. Auditing user logon and logoff activity provides deeper insights into user behavior and helps detect anomalous logons using UBA. ADAudit Plus also alerts users in real-time through SMS or email notifications whenever any critical changes to the contents or configurations of Active Directory are detected. \n\nADAudit Plus offers its services through an annual subscription model, and users can access support resources via an online knowledge base, email, phone, and chat. The platform boasts a range of top features that cater to the specific needs of Windows Server environments. These features include real-time change notifications, allowing users to receive instant alerts on system alterations and user activities. Windows logon monitoring functionality enables the continuous tracking of user logon activities and related data, while account lockout analysis helps to identify the root causes of authentication failures. Additionally, the tool offers robust file change monitoring capabilities, enabling auditing of file accesses and permission modifications across various file systems.\n\nOther notable features encompass security and compliance reporting tools, Azure AD auditing capabilities, privileged user monitoring, and detailed reporting on activities related to ADFS, USB usage, and printer activities. Furthermore, ADAudit Plus provides functionalities for employee time tracking, monitoring active and idle time on workstations, as well as file integrity monitoring features to oversee file modifications, deletions, and access permission changes within the network. ADAudit Plus provides its services on an annual subscription basis. Support is available through an online knowledge base, email, phone, and chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4223f3a6-931e-4338-b0bc-a9fd0b954c69.png","url":"https://www.softwareadvice.com.au/software/361342/manageengine-adaudit-plus","@type":"ListItem"},{"name":"tenfold","position":13,"description":"No-Code Identity Governance & Administration with faster time to value. We ensure the right people have access to the right resources at the right time.\n\ntenfold packs a comprehensive IGA toolset into a user-friendly no-code platform. Thanks to its streamlined setup and out-of-the-box application support, tenfold is fully operational in weeks rather than months.\n\nUser Lifecycle Management: Automate on/offboarding with role-based access profiles.\n\nEnd User Self-Service: Delegate access requests and password resets to data owners within departments.\n\nIn-Depth Permission Reporting: Gain full visibility into who has access to unstructured data across file servers, Microsoft 365 and beyond.\n\nUser Access Reviews: Carry out regular access audits and remove outdated access.\n\nSeparation of Duties: Stop fraud and conflicts of interest by preventing users from holding conflicting privileges.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/986d05c6-8221-43b6-bc85-fa89e0ab13b4.png","url":"https://www.softwareadvice.com.au/software/404732/tenfold","@type":"ListItem"},{"name":"Orchestry Software","position":14,"description":"Orchestry is a well-balanced SaaS platform created by Microsoft 365 MVPs with end-users in mind for IT Administrators. For Microsoft Teams, SharePoint Online, and the entire Microsoft 365 suite, it consists of adoption tools, lifecycle management, engaging templates, actionable insights, empowered self-service provisioning, and transparent governance.\n\nOrchestry gives businesses the ability to get rid of issues with Microsoft Teams and Microsoft 365 like sprawl, duplication, access restrictions, and clogged governance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9acb619f-cda5-49aa-8393-8b26d0205e9d.jpeg","url":"https://www.softwareadvice.com.au/software/383321/orchestry-software","@type":"ListItem"},{"name":"B-Line","position":15,"description":"B-Line is a flexible workplace management and security platform that helps employers and asset managers manage their hybrid workplace with flex management, digital access, and ongoing capacity monitoring. \n\nThe interior positioning system enables organizations and building owners to assess the risk of their portfolio and make data-driven decisions. Through real-time messaging tenants can instantly communicate directly with building managers and in-app surveys to ensure occupant satisfaction and confidence in the safety of their workplace. \n\n\nProduct Services\n\n- Building access control and interior positioning system\n- Contact tracing, capacity monitoring, and emergency alert platform\n- Predictive analytics and outbreak assessment tool\n- Indoor air quality monitoring and remediation\n- Mobile meeting and room booking \n- Real-time spatial usage and optimization\n- Parking and transportation demand management\n- Automated reporting for green building certification","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2bbb5981-1707-48fb-9c40-c9861b1213d8.png","url":"https://www.softwareadvice.com.au/software/374355/b-line","@type":"ListItem"},{"name":"Conecta Suite","position":16,"description":"Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.\nBy integrating Conecta Suite, you enhance the use of the Admin Console with increased security and detailed resource management, allowing your team to collaborate and communicate more smoothly and securely.\nConecta Suite not only optimizes productivity but also strengthens security, safeguarding your data against threats and unauthorized access. Key features include:\n✅ Automatic email signature reapplication;\n✅ Access restrictions by time, system, browser, and IP;\n✅ Custom shift scheduling;\n✅ Automatic or manual device disconnection;\n✅ Deactivation of licenses for former employees;\n✅ Detailed reports on logins and file sharing;\n✅ Custom login screen with company branding;\n✅ Email and Drive file migration between users","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6430a9a4-eb31-4865-a5cb-12699bdde077.png","url":"https://www.softwareadvice.com.au/software/366554/conecta-suite","@type":"ListItem"},{"name":"SecureW2 JoinNow Platform","position":17,"description":"JoinNow Cloud RADIUS eliminates the risks of legacy protocols and credential theft with a cloud-native solution built for modern IT. By integrating with platforms like Azure AD, Okta, and Google, it delivers secure, certificate-based, passwordless authentication for your entire network.\n\nWith real-time intelligence (RTI) technology, it doesn’t just manage devices—it verifies user groups and device identities across multiple identity providers instantly. JoinNow Cloud RADIUS gives you a centralized authentication platform that’s simple, scalable, and built to secure your identity infrastructure without the hassle.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9f2453ee-4d09-404c-bd25-2e44d264fa4d.jpeg","url":"https://www.softwareadvice.com.au/software/522522/JoinNow-Cloud-RADIUS","@type":"ListItem"},{"name":"NordPass Business","position":18,"description":"NordPass Business — The Ultimate Password Manager for Your Organization.\n\nTrusted by businesses worldwide, NordPass Business offers a cutting-edge, zero-knowledge security architecture password management solution for businesses of all sizes and industries.\n\nNordPass Business is designed to empower organizations by simplifying password management, enhancing security, and improving productivity.\n\nNordPass Business provides an array of features that make it an indispensable tool for businesses:\n- Log in to your accounts instantly.\n- Safely share access and sensitive data between teams.\n- Smoothly onboard and offboard employees.\n- Enforce a company-wide password policy.\n- Receive instant breach alerts.\n- Identify weak, old, or reused passwords.\n- Get access to the activity log of all employees\nAnd more.\n\nYou can also use passkeys - a new type of authentication that allows users to securely log in to websites and applications without having to enter their password.\n\nUnlock your team's full potential by letting NordPass take the load off their hands without sacrificing security!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b147dceb-38d5-4aad-a161-8a06ef2df474.png","url":"https://www.softwareadvice.com.au/software/405360/nordpass-business","@type":"ListItem"},{"name":"Ping Identity","position":19,"description":"At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. We champion every identity. \n\nHow do we do it? Through a no-code, drag-and-drop canvas that allows enterprises of all sizes to orchestrate and iterate their identity flows. From designing user experiences to automating identity workflows to methodically migrating users from different data stores, our orchestration tool allows anyone to design flows that integrate all your chosen identity vendors.\n\nIdentity has traditionally been a highly specialized skill set but now requires input from technical and non-technical audiences. Ping’s orchestration solution unleashes the potential of identity by enabling people at various levels to create, test, optimize and deploy user experiences through no-code integrations and flows.\n\n\t•\tIntegrate new products and services with speed and precision\n\t•\tStreamline multi-vendor architectures without custom coding\n\t•\tExplore new ways to engage users and optimize workflows with minimal disruption\n\nPing offers hundreds of integration kits, connectors, and productized flows to easily deploy the following capabilities:\n\t•\tIdentity Verification\n\t•\tCredential Issuance\n\t•\tProfile Management\n\t•\tSingle Sign-On / Authentication\n\t•\tMulti-Factor Authentication\n\t•\tAuthorization\n\t•\tThreat Insights\n\nWith Ping Identity’s PingOne Cloud platform, you can have your choice of multiple deployment options, no matter where you are on your cloud migration or digital transformation journey. We offer solutions that work across hybrid, multi-cloud, multi-generational, cloud-first, or completely on-premise environments.\n\nWe serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/026a740e-5e5f-480b-94d5-19e12e157521.png","url":"https://www.softwareadvice.com.au/software/150649/pingidentity","@type":"ListItem"},{"name":"miniOrange","position":20,"description":"The simplest platform which integrates thousands of applications with convenient features such as SSO, MFA, Provisioning, etc. with any user source - AD, Azure AD, Okta, miniOrange.\n\nThe product offers comprehensive features such as Single-Sign-On, Multi-Factor Authentication, User Provisioning, Identity & Cross-Protocol Brokering, etc.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4accf338-6e3b-4e2a-bda6-3039afcf2f22.png","url":"https://www.softwareadvice.com.au/software/342508/single-sign-on","@type":"ListItem"},{"name":"Avatier Identity Anywhere","position":21,"description":"Avatier Identity Anywhere is a cloud-based identity management solution designed to help businesses manage their employees' digital security. It includes features like password management, single sign-on, lifecycle management and group automation.\n\n\nAvatier Identity Anywhere password manager includes secure stations with biometrics and facial recognition technologies. Password administrators can choose to include or exclude individuals, groups or even the entire operational unit to control deployment of emails and security updates. Its single sign-on module features instant directory authentication and auto-detection and policy enforcement.\n\n\nAvatier Identity Anywhere solution includes integrated audit controls to enforce policy compliance before role assignment. Admins can receive and approve users requests from their smartphones and tablets.\n\n\nThe solution is available on a per user per month subscription. Support is offered via phone, email and live chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7232accf-5011-4cdf-a197-6bc126d853c6.png","url":"https://www.softwareadvice.com.au/software/177628/avatier","@type":"ListItem"},{"name":"Passbolt","position":22,"description":"Passbolt is the open-source password manager designed with team needs in mind, simplifying password management for organizations by offering a secure platform usable with confidence by everyone from tech teams to non-technical staff. It aids in preventing the common pitfalls of password sharing while ensuring that all data remains under the organization's control on its servers.\n\nWhy Choose Passbolt?\n\nEase of Use: Featuring an intuitive interface, Passbolt is developed for easy adoption across various levels of tech proficiency, enabling effective management and sharing of passwords by anyone.\n\nSecurity and Privacy First: Utilizing OpenPGP encryption to secure data, Passbolt aligns with the highest standards of data protection, offering assurance that sensitive information is secure.\n\nFull Control of Data: Being a self-hosted solution allows organizations to retain all data on their premises, which is vital for compliance with strict regulations like GDPR.\n\nEmpowering Collaboration: With role-based access control, Passbolt enables managers to set precise user permissions, ensuring team members have appropriate access to necessary tools.\n\nDedicated Support: Recognizing the importance of reliable support, Passbolt provides comprehensive documentation, community support, and optional professional services to guide users at every step.\n\nPassbolt is more than a password manager; it is a solution that promotes collaboration, enhances security, and supports daily operations without adding complexity. Ideal for organizations that prioritize security, privacy, and ease of use, Passbolt ensures that password management is no longer burdensome but a seamless aspect of the operational workflow.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ad3a7ddb-399b-4757-97ca-7dc70f63b1e1.png","url":"https://www.softwareadvice.com.au/software/450980/passbolt","@type":"ListItem"},{"name":"SAP Access Control","position":23,"description":"SAP Access Control is an access management software designed to help businesses across various industry verticals, including banking, financial services, energy and natural resources, professional services, automotive, healthcare, retail, agribusiness and more. Key features include access request, custom user groups, access control, access risk analysis and remediation. \n\nTeams using SAP Access Control can analyze risk through predefined rule sets and streamline the performance of cross-system analysis across enterprise applications in real-time or in offline mode. Administrators can manage access using automated access requests, embedded simulations and automated provisioning to various applications. Additionally, organizations can certify assignment and role content to team members and review role and user transaction details. \n\nSAP Access Control integrates with SAP Cloud Identity Access Governance, SAP SuccessFactors, SAP Process Control, SAP HANA DB, SAP S/4HANA On-Premise and other third-party applications. Support is extended via phone, email, documentation and FAQs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f555dc8-971f-4c54-92f4-93754c4b86d2.png","url":"https://www.softwareadvice.com.au/software/233830/sap-access-control","@type":"ListItem"},{"name":"Symantec VIP","position":24,"description":"Symantec VIP is an identity management software that helps organizations to manage and protect their online identities. It provides a secure platform for organizations to store, share and update sensitive data. Symantec VIP also allows organizations to control access to applications and systems.\n\nThe platform enables managers to assign and revoke access rights for users to ensure that the system is secure. Symantec VIP also offers a single sign-on functionality across multiple systems and applications, ensuring that users do not have to remember multiple passwords.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f51aa499-d501-460d-b11a-ff40cf22fc2d.png","url":"https://www.softwareadvice.com.au/software/295157/symantec-vip","@type":"ListItem"},{"name":"Zluri","position":25,"description":"Zluri is a data-driven enterprise SaaS management platform that facilitates discovery, management, optimization, and compliance of an organization's SaaS stack.\n\nZluri helps organizations discover their entire SaaS ecosystem and helps them eliminate SaaS wastage by removing duplicate apps, finding unused and underused apps, and consolidate apps with overlapping functions.\n\nZluri also helps automate IT tasks like SaaS procurement, onboarding and offboarding of apps, and contract renewals.\n\nIt also secures SaaS ecosystems by discovering unapproved apps, remove unsecured apps and eliminate compliance risks.\n\nIn short, Zluri puts IT teams back in control of their SaaS stack.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c3accaa-4b14-4454-9e17-ac658414bb26.png","url":"https://www.softwareadvice.com.au/software/413652/zluri","@type":"ListItem"}],"numberOfItems":25}
</script>
