Centrify

Our Enterprise Mobility Management (EMM) solutions help gain control of mobile access security, minimize threats, manage devices & more. Start a FREE Trial!

20 Alternatives To Centrify

Verified
images/2021/01/DS-Resize.jpg}}

DriveStrike

DriveStrike delivers mobile device management on all platforms and protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise.

10Duke Identity Provider

10Duke Identity Provider is an enterprise identity management solution, provides seamless SSO access, supports federated identity, AD, Azure AD, LDAP, social sign-in and others.
images/2020/03/1password.jpg}}

1Password

1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser. 1Password is the easiest way to store and use strong passwords. Log in to sites and fill forms securely with a single click.
images/2020/03/auth0.jpg}}

Auth0

Auth0 is a program for people to get authentication and authorization services for their own business use.
images/2020/03/authanvil.jpg}}

AuthAnvil

AuthAnvil software is an integrated identity and access management tool designed to help IT managers service their networks, infrastructure network, and ensure that devices are safe and secure at all times.
images/2020/04/Authy.png}}

Authy

Best rated Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.
images/2020/04/Avatier.png}}

Avatier

Avatier’s best identity and access management solutions work for enterprises through the power of identity services.

Azure Multi-Factor Authentication

Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.

Bitium

Provider of enterprise-class Single Sign-On (SSO), identity and access management, and business password management for cloud-forward companies and teams.
images/2020/04/CyberArk-Privileged-Account-Security.png}}

CyberArk Privileged Account Security

CyberArk Privileged Account Security is a leading account management solution that is designed to ensure the safety of your privileged accounts, password and devices etc.
images/2020/03/dashlane.jpg}}

Dashlane

Dashlane is a secure way to bypass tedious logins, forms, and purchases online. Save all of your information and save time in your online transactions.

Duo Security

Duo Security provides cloud-based two-factor authentication. Duo’s technology can be deployed to protect users, data, and applications from breaches, credential theft, and account takeover.

Foxpass

Foxpass manages users, groups, and SSH keys (plus a LDAP and RADIUS interfaces) to increase an organization’s server and network security.

ILANTUS IDaaS

Ilantus provides secure identity and access management with Single Sign-On, Multi-factor Authentication, Lifecycle Management (Provisioning), and more.

Lastpass

LastPass is an online password manager and form filler that makes web browsing easier and more secure.

LoginRadius

Loginradius is a cloud-based customer identity and access management platform. LoginRadius empowers businesses to deliver a delightful customer experience without compromising security.

Okta

Enterprise-grade identity management for all your apps, users & devices
images/2020/04/Oracle-Identity-Manager.png}}

Oracle Identity Manager

Oracle Identity Management enables oganizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources.

RSA SecurID

RSA SecurID is a multi-factor authentication and identity assurance solution.

VMware Identity Manager

Welcome to VMware Identity Manager documentation. Use the navigation on the left to browse through documentation for your version of VMware Identity Manager, either Cloud documentation for cloud services, or by version for on premises releases.