User Provisioning Software in Europe

Comparing 25 vendors in User Provisioning Software across 110 criteria.
All vendors(22)
Filters
Reset
20
22
19
20
13
14
17
6
22
6
19
20
12
10
15
20
17
16
20
14
15
20
Oracle offers a wide portfolio of user provisioning services to its commercial clientele. The company provides user provisioning with the help of the integrated AACG and OIM solutions. Oracle Identity Management helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access.
Read less Read more
4.1
IBM is a prominent player in the user provisioning market, and it provides enhanced features and functionalities to its commercial customers. The company provides reliable IAM services for user provisioning by helping clients implement the IBM Cloud Identity Service for establishing automated processes based on user role authorization and predefined policies, and implementing consistent policy administration and enforcement processes.
Read less Read more
Layer7 formerly, CA Identity Manager product of Broadcom Limited offers an inbuilt, enhanced user experience, which dramatically simplifies the access request process for business users through an intuitive model where users can easily select roles and entitlements needed to perform operations, viewing access privileges, and checking the status of requests.
Read less Read more
Microsoft provides Identity and Access Managment solutions that deploy a modern identity platform. It Intelligently detect and respond to compromised accounts. This platform retain and expand existing infrastructure while gaining the scalability and security of cloud identity.
Read less Read more
Hitachi ID Systems provides reliable user provisioning solutions with the help of Hitachi ID Identity Manager, which externalizes the management of users, identity attributes, and security entitlements out of individual systems and applications into a shared infrastructure.
Read less Read more
Happiest Minds offers IAM service, which is a combination of processes and software tools that enable management of individual identities based on unified personnel data. These IAM services are important for businesses to protect valuable assets and reduce threats. IAM services are also a vital part of IT to prevent malicious attacks
Read less Read more
3.5
SAP focusses on rapidly building and extending modern business applications with a digital enterprise platform named SAP Cloud Platform Identity Provisioning. With SAP Cloud Platform Identity Provisioning, enterprises can have an updated identity life cycle management by synchronizing data on a regular basis for cloud applications. The company possesses significant breadth of offerings in the user provisioning market and provides enhanced features and functionalities to its commercial customers.
Read less Read more
Dell has built its reputation as a leading technology provider by developing solutions that meet the needs of its commercial clients. The company’s flagship product IAM solution enhances the enterprises’ functionalities while addressing the IAM challenges through on-premises, cloud, and hybrid environments. Dell Identity Manager is a customer-centric solution, which ensures a superior user experience for commercial customers and enterprises.
Read less Read more

SailPoint provides open identity platform which gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. SailPoint Predictive Identity™, uses the power of AI and machine learning to deliver next-generation identity.

Read less Read more
3.1
EmpowerID provides an automated and unified identity administration for identity management. These solutions offer a workflow-driven multi-directory identity and resource administration. The company possesses a significant breadth of offerings in the user provisioning arena, and provides IAM solutions with enhanced features and functionalities to its commercial customers.
Read less Read more
OneLogin provides a wide array of products and solutions to its commercial clients across the globe. IAM 101 is the flagship product used for security, identity and access management, single sign-on, multi-factor authentication, provisioning, and other technologies. The company’s reliable user provisioning solution and its associated offerings offer robust features and functionalities. They are the strengths of the company through which it caters to the user provisioning market.
Read less Read more
2.9
Okta provides independent and neutral platform that people with required technology whenever needed. Okta Identity Cloud offers two products Workforce Identity and Customer Identity. Workforce identity secures and empowers employees and contractors whereas Customer identity engages customers and partners
Read less Read more

The Identity Access Management Suite – Garancy, offered by Beta Systems provides set of tools for controlling and monitoring access to data and applications according to the organizational requirements and specialist role of each user. It provides a scalable connector framework that delivers ready-to-use interfaces to standard applications and systems.

Read less Read more
Centrify Corporation has a broad portfolio of identity management and provisioning solutions. The company offers user provisioning software under its workflow and lifecycle management product. The software automatically routes application requests and creates and manages entitlements within the accounts. It provides Privilege Access Management which is easy to implement and provides very high-level engineering help to design workarounds or solutions for new business needs.
Read less Read more

BMC Remedy IT Service Management give users control of identity service requests and apply rigor to identity related business processes with integrated identity and service management. It increases customer satisfaction ratings with self-service and reduces costs by automating the identity life cycle.

Read less Read more
2.7
Atos provides Evidian, an IAM software suite, which is a part of Bull Atos Technologies. Bull is the Atos brand for technology products and software. The company’s other product, DirX Identity provides cost-effective, automated administration of users and seamless integration with IT Service Management (ITSM). It offers a complete, integrated, and modular solution for digital identity management and access governance.
Read less Read more

Core Security provides identity and access management solutions that actionable intelligence and context needed to manage security risks across the organization. It enforce the principles of least privilege and segregation of duties (SoD) for greater internal controls. 

Read less Read more

Fischer Identity automates the complex task of managing identities for on- and off-premise resources with no limits to scalability or reach, and ensures constant access to innovation. It provides secured identity management.

Read less Read more

Omada provides IT security solutions and services for identity management and access governance enabling organizations to achieve compliance, reduce risk exposure, and maximize efficiency. Omada Identity Suite Manage identities and govern access to resources across your on-premises and cloud-based IT-environments.

Read less Read more
2.2

Ilex is an International software solution company that offers packaged software for managing user lifecycles and authorizations on their information system. Product is named as Meibo Identity Management. The group ensures a charge over employees throughout their time with the company and helps to Over and above it also helps in facilitating publishing and delegating management of people, structures and IT resources.

Read less Read more

Gemalto’s SafeNet protects and manages organizations data, identities and intellectual property through encryption, advanced key management, tokenization, and authentication and access management. SafeNet provides Multi factor authentication, Data encryption, Cloud data security, Data compliance solutions and Big data security solutions.

Read less Read more