IDM365

IDM365

IDM365 is an identity and access management (IAM) software that provides user provisioning, access governance, and identity governance capabilities. It helps manage user identities, access, and permissions across an organization's systems and applications.
IDM365 image
user-provisioning access-governance identity-governance

IDM365: Identity and Access Management Software

An IAM software providing user provisioning, access governance, and identity governance capabilities to manage user identities, access, and permissions across systems and applications.

What is IDM365?

IDM365 is an identity and access management (IAM) solution developed by Tools4Ever. It provides capabilities for managing user identities and access in an organization.

Some key features of IDM365 include:

  • User provisioning - Automatically creates, updates, and deletes user accounts across all connected systems and applications like Active Directory, Office 365, Salesforce, Workday etc.
  • Access governance - Allows managing access requests and certification campaigns to control who has access to what resources.
  • Identity governance - Provides identity lifecycle management, self-service password reset, and other identity-related functions.
  • Compliance reporting - Built-in reports for compliance with regulations like GDPR, ISO27001, NIST etc.
  • Connectors - Pre-built connectors to popular IT systems and ability to build custom connectors.
  • Workflow automation - Automate provisioning, access requests, access certifications etc with configurable workflows.

IDM365 aims to reduce IT costs and risks related to managing identities and access. It provides secure, auditable access management across an organization's IT ecosystem.

IDM365 Features

Features

  1. User provisioning and de-provisioning
  2. Access governance and access reviews
  3. Identity governance and compliance
  4. Single sign-on (SSO) and multi-factor authentication
  5. Role-based access control (RBAC)
  6. Reporting and analytics

Pricing

  • Subscription-Based

Pros

Comprehensive IAM solution with a wide range of features

Streamlines user management and access control

Improves security and compliance

Provides visibility and control over user identities and access

Scalable and customizable to meet organizational needs

Cons

Can be complex to implement and configure for larger organizations

Ongoing maintenance and updates may be required

Potential integration challenges with legacy systems


The Best IDM365 Alternatives

Top Security & Privacy and Identity & Access Management and other similar apps like IDM365


Okta icon

Okta

Okta is a cloud-based identity and access management (IAM) platform that enables organizations to securely connect the right people to the right technologies. It provides a single sign-on gateway to applications, multi-factor authentication for added security, universal directory to store user profiles, lifecycle management capabilities, and much more.Key features and...
Okta image
10Duke Identity Provider icon

10Duke Identity Provider

10Duke Identity Provider is an open source identity and access management (IAM) solution designed to help organizations manage user identities and control access to applications and resources. It allows single sign-on (SSO) by integrating with various applications and services using federated identity standards like SAML, OAuth, and OpenID Connect.As an...
10Duke Identity Provider image
Centrify icon

Centrify

Centrify is an enterprise identity and access management solution used by organizations to secure access to infrastructure, DevOps, cloud, and other modern application environments. It provides the following key capabilities:Centralized access control and single sign-on (SSO) using standards like SAML, OpenID Connect, OAuth, and FIDOMulti-factor authentication (MFA) and adaptive authentication...
Centrify image
LoginRadius icon

LoginRadius

LoginRadius is a customer identity and access management (CIAM) platform designed to secure, manage and control access to web, mobile and IoT applications. It provides a unified interface to handle user registration, authentication, single sign-on (SSO), user management, analytics and more across devices and platforms.Key features of LoginRadius CIAM include:Support...
LoginRadius image
HelloID icon

HelloID

HelloID is an identity and access management (IAM) platform that centralizes the management of user identities, access privileges, governance and administration. Some of the key capabilities of HelloID include:Single sign-on (SSO) - HelloID provides secure single sign-on access to applications and systems through standards like SAML 2.0, OpenID Connect and...
HelloID image
10Duke Identity Bridge icon

10Duke Identity Bridge

10Duke Identity Bridge is an identity and access management solution designed to connect on-premises directories like Active Directory and other LDAP servers to cloud applications. It serves as a bridge to provide seamless identity integration between different systems.Key features of 10Duke Identity Bridge include:Single sign-on (SSO) - Users can access...
10Duke Identity Bridge image