---
description: Page 3 - Discover the best Access Governance Software for your organisation. Compare top Access Governance Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 3 - Best Access Governance Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Access Governance Software](https://www.softwareadvice.com.au/directory/4665/access-governance/software) > [Page 3](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3)

# Access Governance Software

Canonical: https://www.softwareadvice.com.au/directory/4665/access-governance/software

Page: 3 / 5\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=2)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=4)

-----

## Products

1. [Netwrix Endpoint Policy Manager](https://www.softwareadvice.com.au/software/416606/policypak) — 5.0/5 (2 reviews) — PolicyPak picks up where GPOs and MDM services like Intune leave off. Don’t replace them: enhance them\! Netwrix Polic...
2. [MIA](https://www.softwareadvice.com.au/software/528022/MIA) — 5.0/5 (2 reviews) — MIA is platform that helps small and midsized businesses control their SaaS tools and user access. It helps track sof...
3. [Cerbos](https://www.softwareadvice.com.au/software/508552/Cerbos) — 5.0/5 (2 reviews) — Cerbos is an open-source access governance solution that helps businesses manage authorization for applications. It i...
4. [Kinde](https://www.softwareadvice.com.au/software/434014/kinde) — 5.0/5 (2 reviews) — The fully integrated developer platform. Modern auth, access management and billing for engineers. Authentication hap...
5. [AccessOwl](https://www.softwareadvice.com.au/software/349640/accessowl-access-management) — 5.0/5 (1 reviews) — AccessOwl is a Slack-based platform for orchestrating employees' access to SaaS accounts. Automate on and offboarding...
6. [Atlassian Access](https://www.softwareadvice.com.au/software/431253/atlassian-access) — 5.0/5 (1 reviews) — Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud application...
7. [Soffid IAM](https://www.softwareadvice.com.au/software/293928/soffid-iam) — 5.0/5 (1 reviews) — Soffid IAM is a converged IAM platform that brings together Access Management (AM), Identity Governance (IGA), Identi...
8. [Satori](https://www.softwareadvice.com.au/software/373326/satori) — 5.0/5 (1 reviews) — Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual ...
9. [ZertID](https://www.softwareadvice.com.au/software/338582/zertid) — 5.0/5 (1 reviews) — The software allows companies to mitigate risks and safeguard their data from a breach through continuous monitoring....
10. [Carbon Black App Control](https://www.softwareadvice.com.au/software/429220/carbon-black-app-control) — 4.0/5 (1 reviews) — Carbon Black App Control is an on-premise compliance and access governance application that helps businesses streamli...
11. [Venn](https://www.softwareadvice.com.au/software/357710/workplace) — 5.0/5 (1 reviews) — Venn is revolutionizing how businesses enable remote workers and contractors, removing the burden of buying and secur...
12. [RightCrowd Access Analytics](https://www.softwareadvice.com.au/software/197917/rightcrowd-iq) — 5.0/5 (1 reviews) — RightCrowd Access Analytics automates your user access reviews, reduces audit time and helps to demonstrate user acce...
13. [Veza](https://www.softwareadvice.com.au/software/396113/veza) — 5.0/5 (1 reviews) — Veza provides a simple way to visualize the full complexity of identity-to-data relationships and provides both out-o...
14. [The OptimalCloud](https://www.softwareadvice.com.au/software/317728/the-optimalcloud) — 4.0/5 (1 reviews) — The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various ...
15. [Netwrix Directory Manager](https://www.softwareadvice.com.au/software/521564/Netwrix-GroupID) — 3.0/5 (1 reviews) — Netwrix GroupID is a group and user management software that helps organizations streamline their directory managemen...
16. [AgencyAccess](https://www.softwareadvice.com.au/software/515913/AgencyAcess) — 5.0/5 (1 reviews) — AgencyAccess is a client onboarding software designed to simplify access to client advertising, analytics, and ecomme...
17. [AccessHub](https://www.softwareadvice.com.au/software/537414/AccessHub) — 3.0/5 (1 reviews) — AccessHub is an enterprise access governance and security platform designed to close governance, risk, and compliance...
18. [Appsian Security Platform](https://www.softwareadvice.com.au/software/182143/appsian-security-platform) (0 reviews) — Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentic...
19. [Evidian](https://www.softwareadvice.com.au/software/136849/evidian) (0 reviews) — Evidian is a cloud-based and on-premise identity governance and access management solution designed to help enterpris...
20. [Efecte IGA](https://www.softwareadvice.com.au/software/192772/efecte-identity-governance-and-administration) (0 reviews) — Efecte IAM helps enterprises automate identity and access management operations via a unified portal. The built-in pr...
21. [daccord](https://www.softwareadvice.com.au/software/265113/daccord) (0 reviews) — daccord is an access governance software that helps businesses manage and control user rights across all enterprise I...
22. [Lepide Data Security Platform](https://www.softwareadvice.com.au/software/248829/lepide-data-security-platform) (0 reviews) — Lepide Data Security Platform is a software solution created for all data security cases and across all data sources....
23. [Freedom Cloud ACaaS](https://www.softwareadvice.com.au/software/197767/freedom-cloud-acaas) (0 reviews) — Freedom Cloud is a cloud-based access control solution, which helps businesses of all sizes across government, educat...
24. [IDHub](https://www.softwareadvice.com.au/software/328462/idhub) (0 reviews) — IDHub is a fully customizable, flexible, and user-friendly IAM solution. We know managing a highly technical IAM syst...
25. [strongDM](https://www.softwareadvice.com.au/software/270142/strongdm) (0 reviews) — strongDM is a database management software tool designed for SMBs and agencies. It aims to provide technical staff, i...

-----

Page: 3 / 5\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=2)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=4)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)
- [Privileged Access Management Software](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software)
- [Authentication Software](https://www.softwareadvice.com.au/directory/4311/authentication/software)
- [Network Access Control (NAC) Software](https://www.softwareadvice.com.au/directory/4433/network-access-control/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.com.au/directory/4427/ciam/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/4665/access-governance/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@id":"https://www.softwareadvice.com.au/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Access Governance Software","description":"Page 3 - Discover the best Access Governance Software for your organisation. Compare top Access Governance Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3","about":{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3#breadcrumblist"},"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3#itemlist"},"publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Access Governance Software","position":2,"item":"https://www.softwareadvice.com.au/directory/4665/access-governance/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Best Access Governance Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.com.au/directory/4665/access-governance/software?page=3#itemlist","@type":"ItemList","itemListElement":[{"name":"Netwrix Endpoint Policy Manager","position":1,"description":"PolicyPak picks up where GPOs and MDM services like Intune leave off. Don’t replace them: enhance them!\n\nNetwrix PolicyPak works with your existing GPOs or MDM service like Intune, or alongside PolicyPak Cloud!\n\nRemove local administrator rights and enforce least privilege. Stop malware cold and prevent accidental misconfigurations. Increase manageability for desktop applications, browsers, and operating system settings. Granular controls also allow management of removable USB and CD-ROM storage, helping prevent data loss and unauthorized data transfers.\n\nConsolidate and modernize Group Policy by reducing GPO sprawl plus transition Group Policy settings to modern management platforms like Microsoft Intune without using workarounds are brittle scripts. Speed up logins on-prem and get ready for real GPOs in the cloud!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2a50075b-71af-4b57-a07f-22057d03f9aa.png","url":"https://www.softwareadvice.com.au/software/416606/policypak","@type":"ListItem"},{"name":"MIA","position":2,"description":"MIA is platform that helps small and midsized businesses control their SaaS tools and user access. It helps track software subscriptions, see who has access to what and manage unused licenses and shadow IT. Key features include SaaS tracking, access mapping, cost control, security alerts, automation and more.\n\nMIA detects and monitors all software used across the business and tracks who has access to which tools, including external users and ex-employees. It connects third-party banks or accounting software to monitor real spend and cancel what’s unused. It helps businesses be notified of compromised emails, unauthorized access and orphaned accounts. Users can get regular review reminders, streamline onboarding/offboarding and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/760abe73-d096-4c1f-94f0-1c2ff774919d.jpeg","url":"https://www.softwareadvice.com.au/software/528022/MIA","@type":"ListItem"},{"name":"Cerbos","position":3,"description":"Cerbos is an open-source access governance solution that helps businesses manage authorization for applications. It is a policy-based runtime authorization system that allows developers to implement and manage fine-grained access control. The platform offers a centralized management system for role-based access control (RBAC) and attribute-based access control (ABAC) policies.\n\nThis approach enables organizations to define access control rules in a single source and manage them centrally, while the authorization decisions are made locally for low-latency performance. Additionally, Cerbos' open-source nature, combined with its API-based plug-and-play approach, allows it to be a flexible solution capable of adapting to changing business needs and regulatory requirements.\n\nBusiness Benefits of Cerbos Authorization\n\nCompliance with Security Standards:\nCerbos is an ideal solution for Zero Trust Architecture. By externalizing authorization policy management, organizations can meet least-privilege access standards while keeping policy maintenance simple. The stateless design ensures that no request is inherently trusted, and always evaluated at runtime. Cerbos was also designed with data privacy standards in mind, operating solely within your environment and avoiding external dependencies.\n\nCerbos’ Human-readable policies and audit logs make it easier to demonstrate compliance with security and data protection standards including HIPPA, GDPR, SOC2, PCI DSS, ISO27001, and CCPA.\n\nCollaborate Effectively with Diverse Stakeholders:\nCerbos Hub allows non-developer stakeholders to interact with authorization policies without touching the application code. Users have found that the YAML format provides a common language that can be shared between technical and non-technical stakeholders, clarifying conversations about how business requirements can be translated into authorization policies in the application. \n\nSave Months of Developer Time:\nBy decoupling authorization logic from application code, policy updates that might take weeks or months to completely implement can be deployed in minutes. Reclaiming that time for developers means your team can release features and address customer needs faster. \n\nFlexible Deployment Options, Pre-built Integrations and SDKs\nCerbos is designed to adapt to your existing architecture. Cerbos supports authorization across environments—on-premise, cloud, Kubernetes, serverless setups. Cerbos Hub users can also deploy embedded PDPs on device, in-browser, and in serverless environments using our WASM bundle. We offer SDKs for almost any language, and pre-built integrations for popular frameworks. \n\nReliable Support:\nSoftware architects and developers will find support in our Slack Community from other Cerbos users and our own engineers. Users can also book time with our engineers to talk through their questions over a video call.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a3960004-8109-4fd3-9cb1-c14e552d2337.png","url":"https://www.softwareadvice.com.au/software/508552/Cerbos","@type":"ListItem"},{"name":"Kinde","position":4,"description":"The fully integrated developer platform. Modern auth, access management and billing for engineers.\n\nAuthentication happens at some of the most important, and highly impactful, places in your customers' journey. Take control of user authorization with a passwordless authentication, social integrations, and enterprise SSO. Support the branding of all your customers with custom domains and a fully customisable UI by bringing your own pages and designs. Integrate with complex requirements and run your own code during authentication using our powerful workflows. Organise all your business customers using organizations to easily segergate them and fine tune the authentication experience to their individual needs.\n\nMonetize your ideas quickly with Kinde's billing tools. Create subscription plans and collect revenue effortlessly. Kinde adapts to your business model, supporting B2C, B2B, and B2B2C with robust organization management and flexible billing logic that scales with your customers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f925249f-50b2-4367-b34e-7a0d38c88f50.jpeg","url":"https://www.softwareadvice.com.au/software/434014/kinde","@type":"ListItem"},{"name":"AccessOwl","position":5,"description":"AccessOwl is a Slack-based platform for orchestrating employees' access to SaaS accounts. Automate on and offboarding, ad-hoc access requests, and automated creation of an audit trail. The software helps businesses provide the access that employees need without the need for back-and-forth communication.\n\nAccessOwl lets users create a detailed audit trail of all employees' access. Stop running after employees for audit reviews and recertifications. AccessOwl sends out easy to review list of user access that employees can review in a matter of minutes. Utilize automatic reminders to get the access reviews done in time.  \n\nAccessOwl integrates with the software you already use. Automate on- and offboardings right out of your HR system and have AccessOwl take care of the account creation and deletion.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd7ccbcf-8bf1-4093-b750-5f14c5255a98.png","url":"https://www.softwareadvice.com.au/software/349640/accessowl-access-management","@type":"ListItem"},{"name":"Atlassian Access","position":6,"description":"Atlassian Access is designed for large enterprises and helps streamline access throughout Atlassian cloud applications. With single sign-on (SSO), admins can set up one-click access to company apps and enable employees to deploy software. It allows users to enforce two-step verification (2FA) and revoke unauthorized tokens. Admins can also monitor usage and customize multiple authentication policies using a single dashboard, while reviewing audit logs and product reports. Integrations with other CASBs, 24/7 support, and customizable billing are some of the other key features offered by Atlassian Access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96f403cb-590e-4582-9c16-e390449d2daa.png","url":"https://www.softwareadvice.com.au/software/431253/atlassian-access","@type":"ListItem"},{"name":"Soffid IAM","position":7,"description":"Soffid IAM is a converged IAM platform that brings together Access Management (AM), Identity Governance (IGA), Identity Risk & Compliance (IRC) and Privileged Account Management (PAM) into one comprehensive solution - aimed at bringing your security and IT teams together. Soffid is fully scalable, allowing you to start small and grow as needed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/333f80f6-7a9d-4828-924d-71638a2bd3af.png","url":"https://www.softwareadvice.com.au/software/293928/soffid-iam","@type":"ListItem"},{"name":"Satori","position":8,"description":"Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. \n\nSatori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and tracks data usage while applying relevant security policies dynamically. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.\n\nWhat we promise our customers will get from using Satori:\n\nSelf-service access to data that accelerates your data projects. Users use a data portal to view available datasets, and get data to them in seconds instead of weeks (with a manual data access process).\n\nEliminate the risk of a data breach due to overprivileged user access to customer data:\nBecause Satori will create a path for your organization to move from persistent permissions to just-in-time and need-to-know access to data, and provide you with the tools to manage access at scale.\n\nMeet security and compliance requirements for customer data in days:\nBecause Satori covers both access control and audit requirements and is implemented as an add-on to existing data infrastructure.\n\nImprove security while increasing productivity for both admins and end-users:\nBecause Satori automates the lifecycle of accessing data instead of manually editing permissions, and natively integrates into the data consumer environment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0ab98fdf-21e4-492b-8c80-454e772698c5.jpeg","url":"https://www.softwareadvice.com.au/software/373326/satori","@type":"ListItem"},{"name":"ZertID","position":9,"description":"The software allows companies to mitigate risks and safeguard their data from a breach through continuous monitoring. It has real-time centralized visibility, where managers can view who has access to what information. It enables them to notice unauthorized entry, policy violations, and weak points in their system. In the process, ZertID allows business admins and IT teams to take the necessary steps to lock out inappropriate access and reduce risk factors.\n\nZertID allows the IT and management personnel to ensure they take the proper steps to follow the security and privacy regulations governing IGA. It offers uniform access management and administration processes controlled by a standard policy, role, and risk model that allows for more uncomplicated auditing. Organisations can formulate repetitive operations for simpler access certification using role-based dashboards and access. Furthermore, the platform reduces the cost of auditing and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96fd03c6-527b-476b-b706-de140c7fbbca.png","url":"https://www.softwareadvice.com.au/software/338582/zertid","@type":"ListItem"},{"name":"Carbon Black App Control","position":10,"description":"Carbon Black App Control is an on-premise compliance and access governance application that helps businesses streamline processes related to malware protection, downtime elimination, audit control, and more from within a unified platform. It allows supervisors to prevent users from making unauthorized changes via built-in continuous file-integrity monitoring, memory protection, and device control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c35a7453-6dd9-46a5-9e4e-97d2d17b7ad7.png","url":"https://www.softwareadvice.com.au/software/429220/carbon-black-app-control","@type":"ListItem"},{"name":"Venn","position":11,"description":"Venn is revolutionizing how businesses enable remote workers and contractors, removing the burden of buying and securing laptops or dealing with virtual desktops. Our patented technology provides companies with a new approach to securing workers on unmanaged or personal computers. \n\nWith Venn’s Blue Border™, work lives in a company-controlled Secure Enclave installed on the user’s computer, where all data is encrypted and access is managed. Work applications run locally within the Enclave – visually indicated by the Blue Border – isolating and protecting business activity from any personal use on the same computer. Company data is secured without controlling the entire device while ensuring end-user privacy for everything outside the Blue Border. As a result, IT teams can easily support Bring Your Own Device workforces without the cost, complexity, and usability challenges of virtual desktops.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ab5cd452-f0cc-4659-ba01-4718e186c7a8.jpeg","url":"https://www.softwareadvice.com.au/software/357710/workplace","@type":"ListItem"},{"name":"RightCrowd Access Analytics","position":12,"description":"RightCrowd Access Analytics automates your user access reviews, reduces audit time and helps to demonstrate user access compliance across every standard or regulation (ISO 27001, SOX, SOC1/2, HITRUST, PCI-DSS, HIPAA etc). \n\nIt allows HR, IT, OT security teams to easily collaborate, review and take action against inappropriate access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d45aff52-6cfc-4149-912b-ac67d7720b0c.png","url":"https://www.softwareadvice.com.au/software/197917/rightcrowd-iq","@type":"ListItem"},{"name":"Veza","position":13,"description":"Veza provides a simple way to visualize the full complexity of identity-to-data relationships and provides both out-of-the-box and custom reports, alerts and risks, and much more.\n\nConfiguring Veza is quick and easy; it typically takes under an hour to have a functional system up and running. All the product needs is access to a read-only role in the target systems; it will discover the data structures and permissions automatically. As soon as the product has ingested data from an integrated system, it will immediately start showing information about Veza-identified security risks revealed by that new data.\n\nStarting from the Veza dashboard, these surfaced results can be explored in expertly curated assessments, collected views of discovered risks, and Veza- created alerts. All of this information can be viewed, filtered, and aggregated in the Authorization Graph, a visual representation of the identity-to-data relationships that includes metadata details of all the entities in these relationships. Custom queries for the Authorization Graph using the Query Builder enable customers to find potential issues and violations that might be specific to their own organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9495d972-d20b-449e-8ae2-d1d35fdb7d91.jpeg","url":"https://www.softwareadvice.com.au/software/396113/veza","@type":"ListItem"},{"name":"The OptimalCloud","position":14,"description":"The OptimalCloud is an identity and access management solution designed to help enterprises handle access to various applications using single sign-on (SSO) authentication technology. The platform includes audit trails, which enable organizations to view and monitor user activities across applications, groups and devices on a unified portal.\n\n\nThe OptimalCloud enables users to assign tasks to teams, reset passwords, submit registration requests, and approve workflows. It offers a variety of features such as a self-service portal, mobile device push authentication, multiple users, activity tracking, custom configuration and more. Additionally, the built-in multi-factor authentication functionality lets administrators manage access to applications on internal or external networks through one-time passwords and text-based verifications.\n\n\nThe OptimalCloud facilitates integration with various third-party applications including Dropbox, Zoho, Amazon Web Services, Confluence, CenturyLink and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76e2f4f9-c80f-4f81-9e17-03bb8768ad26.png","url":"https://www.softwareadvice.com.au/software/317728/the-optimalcloud","@type":"ListItem"},{"name":"Netwrix Directory Manager","position":15,"description":"Netwrix GroupID is a group and user management software that helps organizations streamline their directory management and enhance security. The software caters to businesses of all sizes, from small and medium enterprises to large corporations, across various industries such as healthcare, finance, and government.\n\nNetwrix GroupID automates and delegates group and user management to ensure directories remain current and secure. It allows organizations to streamline group and user management through attestation workflows, which require group owners and users to regularly validate their active status. This helps keep the directory clean and minimizes the attack surface. The software also automatically ensures accurate group memberships as user attributes change, by creating queries that determine group membership based on users' current attributes. This helps organizations untangle nested groups and simplify the creation of group hierarchies, ensuring that changes to parent groups are automatically reflected in child groups.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b4d7e5e0-5901-408b-a9fa-e3d1553fad21.png","url":"https://www.softwareadvice.com.au/software/521564/Netwrix-GroupID","@type":"ListItem"},{"name":"AgencyAccess","position":16,"description":"AgencyAccess is a client onboarding software designed to simplify access to client advertising, analytics, and ecommerce accounts through a single customizable link. It is intended to address challenges associated with traditional onboarding methods, such as managing email threads, scheduling explanatory calls, and waiting for account access.\n\nThe software supports integrations with various platforms, including Google, Meta, Shopify, LinkedIn, TikTok, and Twitter. Agencies can personalize the onboarding process by adding branding elements such as logos and colors, hosting the system on a subdomain, and using intake forms to collect client information. Multi-language support enables localized onboarding for clients in different regions.\n\nAgencyAccess prioritizes security by using official platform APIs and does not store client usernames or passwords. Data transfers are encrypted and comply with GDPR standards to protect client information. Permissions granted through the system remain active within the respective platforms, even if the software subscription ends. A centralized dashboard provides an overview of client accounts and permissions, helping agencies monitor onboarding progress and identify missing access points.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3a1b9be0-d582-4754-88f9-286093c923c9.jpeg","url":"https://www.softwareadvice.com.au/software/515913/AgencyAcess","@type":"ListItem"},{"name":"AccessHub","position":17,"description":"AccessHub is an enterprise access governance and security platform designed to close governance, risk, and compliance gaps across complex hybrid environments. As access expands across cloud platforms, enterprise applications, APIs, and interconnected systems, organizations struggle with fragmented governance, limited visibility, and increasing audit exposure. AccessHub provides unified governance for human and non-human identities, helping enterprises reduce risk, strengthen compliance, and maintain consistent security controls across SAP, non-SAP, and multi-cloud ecosystems.\nThe platform combines enterprise-wide user governance and non-human identity security automation to extend access controls beyond traditional SAP GRC limitations. Prebuilt connectors integrate SAP and third-party systems, enabling consistent policy enforcement, lifecycle governance, and cross-system risk visibility. Automated provisioning, access reviews, and role governance streamline identity workflows while reducing manual effort and operational overhead.\nAccessHub’s Non-Human Identity Security Automation module governs service accounts, API keys, and technical credentials with clear ownership, lifecycle control, and automated rotation. Risk-based prioritization, least-privilege enforcement, and continuous monitoring help prevent excessive privileges, fraud scenarios, and unmanaged access risks.\nThe platform also delivers audit-ready reporting with automated evidence collection and full traceability aligned with global regulations such as SOX and GDPR. By unifying governance, compliance, and identity lifecycle management in a single framework, AccessHub enables enterprises to reduce audit findings, lower operational costs, and enforce consistent governance across rapidly evolving digital landscapes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ffe04d21-b9c8-45e4-a3f1-783654805771.png","url":"https://www.softwareadvice.com.au/software/537414/AccessHub","@type":"ListItem"},{"name":"Appsian Security Platform","position":18,"description":"Appsian Security Platform is a cloud-based solution designed to help organizations manage data access, user authentication, network security, and other operations for PeopleSoft and SAP applications. The platform includes a transaction logging functionality, which lets administrators record user activities and session time.\n\n\nAppsian Security Platform allows IT teams to provide role-based permissions and hide data across search results, fields, queries and browsers via a unified portal. It offers a host of features such as remote access, configurable rule engine, location-based security, threat detection and prevention, risk assessment and more. Additionally, managers can generate reports to analyse usage trends, data access, privileged accounts usage, security alerts and other metrics using Appsian 360 application.\n\n\nAppsian Security Platform supports integration with various third-party systems including Oracle, Duo, Okta, Twilio and more. Pricing details are available on request and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd3ac52e-d138-450d-90b6-18161508aeb3.png","url":"https://www.softwareadvice.com.au/software/182143/appsian-security-platform","@type":"ListItem"},{"name":"Evidian","position":19,"description":"Evidian is a cloud-based and on-premise identity governance and access management solution designed to help enterprises across finance, healthcare, telecom and various other sectors ensure the security of information systems. Features include access control, compliance management, reporting and audit. \n\n\nThe solution allows administrators to identify and manage users accessing the applications and define operational policies. Its analytics and intelligence module helps professionals identify high-risk users, dormant or orphaned accounts and abnormal behavior. The single sign-on (SSO) capability enables supervisors to delegate user accounts, manage permissions and perform re-authentication. \n\n\nEvidian offers integration with several third-party platforms such as Google Cloud, CyberArk, Wallix, Nagios and more. It comes with mobile applications for iOS and Android. Pricing is available on request and support is offered via documentation and online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76266302-b613-4fdd-b4b3-16167d3482fe.jpeg","url":"https://www.softwareadvice.com.au/software/136849/evidian","@type":"ListItem"},{"name":"Efecte IGA","position":20,"description":"Efecte IAM helps enterprises automate identity and access management operations via a unified portal. The built-in predefined customizable workflows facilitate real-time management capabilities, enabling organizations to attend to identity and access requests. \n\nEfecte IAM lets users submit requests for business roles, new access and other services through a self-service portal. Managers can view and approve or reject the requests along with reasons. It offers a host of features such as customizable forms. real-time updates, interactive dashboard, graphs, reports, a drag-and-drop interface and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1d6e01e2-a65c-48d9-8970-ad5631a88ca3.png","url":"https://www.softwareadvice.com.au/software/192772/efecte-identity-governance-and-administration","@type":"ListItem"},{"name":"daccord","position":21,"description":"daccord is an access governance software that helps businesses manage and control user rights across all enterprise IT systems.\nThe software is available in 3 editions:\n\nAccess Governance Edition\nWith the Access Governance Edition, you can evaluate authorizations in any target system and certify them in an audit-proof manner.\n\nMicrosoft Edition\nIt allows companies to analyze and monitor authorizations in the Active Directory in the NTFS file server.\n\nAdvanced Editing\nThe Advanced Edition is our \"full-stack IAM\". It is a scalable and comprehensive Identity & Access Management System","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0b87c1c7-fe45-45da-a723-d6cf3c719e46.png","url":"https://www.softwareadvice.com.au/software/265113/daccord","@type":"ListItem"},{"name":"Lepide Data Security Platform","position":22,"description":"Lepide Data Security Platform is a software solution created for all data security cases and across all data sources. The platform helps users protect their sensitive data from corrupt user accounts as well as from any unknown and rogue users. The software provides users with the following data protection tools: an active directory for tracking movement, threat identification and detection, data auditing, content scanning and more. Users can use the platform to analyzes threats in real-time and to integrate with other softwares such as splunk, Radar, FireEye and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/061ce824-f569-43e5-8b7b-3aebbc625076.png","url":"https://www.softwareadvice.com.au/software/248829/lepide-data-security-platform","@type":"ListItem"},{"name":"Freedom Cloud ACaaS","position":23,"description":"Freedom Cloud is a cloud-based access control solution, which helps businesses of all sizes across government, education, aviation and various other industries manage, monitor and maintain physical access control systems. \n\nFreedom Cloud offers email notifications for alarm and port triggered action events. It includes separate web pages for alarms and map monitoring. It also allows organizations to customize the solution and the color, logo and overlay of premises readers. The solution utilizes encryption bridges to interact with onsite and geo-distributed solutions. Additionally, administrators can backup and securely store data while accessing visitor records. \n\nFreedom Cloud offers integration with various third-party applications such as Assa Abloy, Active Directory, 3VR and more. Pricing is available on request and support is extended via email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/23554838-c26c-4f14-8df6-e14d05151506.png","url":"https://www.softwareadvice.com.au/software/197767/freedom-cloud-acaas","@type":"ListItem"},{"name":"IDHub","position":24,"description":"IDHub is a fully customizable, flexible, and user-friendly IAM solution. We know managing a highly technical IAM system can be challenging. However, convincing users how and why to use it is often as difficult. After nearly two decades of IAM experience, we designed IDHub with the needs of users and administrators in mind, for the best in usability, functionality, and customization, to make your jobs easier. We constantly expand our extensive training videos and easy read documentation, to make using and managing IDHub as easy as possible. We believe IAM processes should be incredibly fast. Our fail fast, recover faster model, allows businesses to launch and deploy complete systems and updates within hours and days, not weeks and months.\n\nAutomated processes, combined with manager administrator controls for day-to-day tasks, take the burden off IT departments, and empower managers with more control over their direct team. Allow your IT experts to focus on critical issues, and leave the simple IAM tasks to your regular users, saving you countless hours and revenue, while increasing productivity. Managers and users can request access and entitlements for internal and 3rd-party applications, with a simple point and click interface. In addition, users can track the process from request to provisioning. \n\nAdministrators and managers can design and build custom workflows for requests, approvals, and certification processes for each application, with our no-code drag-and-drop workflow builder, without needing a developer or IT department. Guarantee security compliance for HIPAA, NERC, CIP, or DSS with custom certifications. \n\nAutomate your certification processes on individual schedules, using conditional rule queries, for specific groups, collections, or applications based on any available attributes or conditions for granular targets. Identify and target specific high-risk resources or users according to your rules, or use the built-in high-risk ?lters. Schedule automatic triggers for certi?cations, reconciliations, audits, custom work?ows, or reminder emails.\n\nDon’t get locked into an authorization system that will frustrate users and create management issues. Create the perfect login experience for your users.  Our flexible solution allows organizations to directly integrate with any authorization tool to meet user needs and maintain security policies.\n\nCreate custom dynamic user roles, based on entitlements, applications, and user attributes. Automatically assign or remove roles, based on changing user attributes. Role-based access automatically provisions and de-provisions resources, based on your rules. Any role change will immediately trigger account changes, ensuring appropriate access, rights, and permissions are associated with the account. Proxy users allow users to designate other team members, to take on their responsibilities immediately, in a sudden change in employment.\n\nContinuously scan employment status of all users with regularly scheduled audits. Then, remove user access to sensitive data in seconds, to help prevent data breaches. Customizable service requests give users the ability to request any service or action. Create a request process for, o?ce equipment, maintenance, printing, devices, or any service your team needs. Save and share lists allow users to compile requestable resources that can be reused for recurring tasks or shared with other users.\n\nUtilize our provided dev environment to test new implementations, workflows, or other customizations without affecting your production install. Gain a holistic view of your apps, resources, and users with our complete set of enterprise tools, all with SaaS pricing in our simple, user-based pricing model. Get IAM features not available anywhere else, free up your IT department, keep your employees happy, and increase your bottom line, with IDHub by Sath.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/db560d58-a418-4411-bea9-3b6c54e75dc3.png","url":"https://www.softwareadvice.com.au/software/328462/idhub","@type":"ListItem"},{"name":"strongDM","position":25,"description":"strongDM is a database management software tool designed for SMBs and agencies. It aims to provide technical staff, including CTOs, CIOs, DevOps, and infrastructure engineers, secure access to their company's resources. It blends authentication, authorization, observability, and networking into a single dashboard for easy, secure, and convenient management access across the tech stack.\n\nThe tool facilitates SSO logins and management for any database, server, protocol, or environment. It comes with a NoSQL database, real-time monitoring, security audits, vulnerability protection, and audit trails for every SSH, RDP session, and query — all rolled into one.\n\nstrongDM lets administrators set up two-factor or multi-factor authentication, providing users with just-in-time access to the resources they need. Thanks to its granular audit trail, they can check team and individual user activity. They can also restrict access and grant role-based permissions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc9c7ad6-1099-438c-a99e-e6c8710e321c.png","url":"https://www.softwareadvice.com.au/software/270142/strongdm","@type":"ListItem"}],"numberOfItems":25}
</script>
