Latka logo

Top 239 Identity and Access Management (IAM) Software SaaS Companies in May 2026

As of May 2026, there are 239 SaaS companies in Identity and Access Management (IAM) Software. They have combined revenues of $3.9B and employ 31.8K people. They have raised $4.7B and serve 680.2K customers combined.

Identity and Access Management (IAM) Software encompasses a set of technologies and policies designed to manage digital identities and control user access to resources within an organization. These systems ensure that the right individuals have the appropriate access to technology resources, evaluating, granting, and monitoring access through a combination of authentication and authorization processes. IAM solutions are increasingly critical for organizations as they navigate complex regulatory requirements and security threats. Typical features of IAM software include user authentication and single sign-on (SSO), which simplify access to multiple applications. Additionally, they often incorporate role-based access control (RBAC) to enforce security policies based on user roles, along with auditing capabilities to track and manage user activity. Common buyer personas for IAM solutions include IT administrators looking to enhance security, compliance officers ensuring regulatory adherence, and human resources personnel managing employee access as part of onboarding and offboarding processes.

Companies
239
Revenue
$3.9B
Funding
$4.7B
Employees
31.8K

Filters

Sorting: Highest -> Lowest

Filters

Top Identity and Access Management (IAM) Software Companies

Showing 10 of 59 companies ranked by annual revenue.

1
Keyfactor

Independence, Ohio, United States

Provider of an information security platform intended to offer identity and access management services. The company's platform provides enterprise-ready software, managed security services as well as security as a service and consulting services, enabling clients to secure and operate in cloud computing platforms.

Revenue
$100M
Customers
500
Year founded
2001
Funding
$211.9M
Team size
513
Growth
-
2
Keeper Security

Chicago, Illinois, United States

Keeper Security is the highly-rated and patented cybersecurity platform for preventing password-related data breaches and cyberthreats

Revenue
$90.6M
Customers
1K
Year founded
2011
Funding
$60.3M
Team size
344
Growth
23.31%
3
LastPass

Boston, Massachusetts, United States

LastPass is a leading identity and password manager, making it easier to log in to life and work. Trusted by 100,000 businesses and millions of users, LastPass combines advanced security with effortless access for individuals, families, small business owners, and enterprise professionals. With LastPass, important credentials are protected and private – and always within reach. Learn more via www.lastpass.com.

Revenue
$90.5M
Customers
-
Year founded
2008
Funding
-
Team size
823
Growth
-
4
AzInTelecom

Baku, Azerbaijan

AzInTelecom provides modern digital solutions for businesses, including digital signature and identification, cloud technologies, cybersecurity, and information security services.

Revenue
$74.5M
Customers
-
Year founded
2015
Funding
-
Team size
436
Growth
-
5
Anon

San Francisco, California, United States

Anon is a developer platform that provides tools and infrastructure for building user-permissioned integrations across the internet. It allows developers to create secure connections between AI agents and user accounts on various websites and services, even those without traditional APIs. Anon handles complex authentication processes, including SSO, OAuth, and 2FA, while maintaining user privacy and security

Revenue
$73.9M
Customers
-
Year founded
2023
Funding
-
Team size
672
Growth
-
6
ThreatLocker

Orlando, Florida, United States

The ThreatLocker® story. ThreatLocker journey began with a mission to protect businesses from the devastating effects of cyberattacks. Co-founders Danny Jenkins, Sami Jenkins, and John Carolan set out to create solutions designed to eliminate the guessing game of cybersecurity. Danny Jenkins began his cybersecurity career in 1997, which included roles such as managing corporate IT, ethical hacking, and becoming an entrepreneur. A significant turning point occurred when Jenkins witnessed the aftermath of a severe phishing attack. The attack disrupted business operations and nearly resulted in the loss of the company. This incident underscored the critical gaps in existing reactive cybersecurity strategies and motivated Jenkins to develop a proactive, Zero Trust solution designed to give businesses more control over their defenses. With this commitment, along with Sami Jenkins and John Carolan, he co-founded ThreatLocker, making the Zero Trust approach to cybersecurity reality for many. In just a few years, over 50,000 businesses worldwide have embraced ThreatLocker solutions, a testament companies are ready to move beyond the endless game of trying to outsmart cybercriminals and are adopting instead new, proactive ways to defend against them with ThreatLocker redefining Zero Trust solutions.

Revenue
$71.5M
Customers
-
Year founded
2017
Funding
-
Team size
650
Growth
-
7
Alertenterprise Inc.

Fremont, United States

AlertEnterprise offers identity intelligence and enterprise access management software for preventing fraud, theft and acts of sabotage.

Revenue
$66.2M
Customers
-
Year founded
2007
Funding
$27M
Team size
322
Growth
42.13%
8
Iru

Miami, Florida, United States

Iru (formerly Kandji) is an AI-powered IT and security platform designed to help organizations secure their users, applications, and devices in an increasingly complex digital landscape. Tailored for the AI era, Iru integrates identity and access management, endpoint security, and compliance automation into a single cohesive solution. This unification streamlines operations, allowing IT and security teams to regain control and allocate their time more effectively. Targeted at fast-growing companies, Iru addresses the challenges faced by IT and security professionals who often juggle multiple tools and systems. The platform is particularly beneficial for organizations that require robust security measures while maintaining agility and efficiency. Use cases include managing user access across various applications, ensuring device security, and automating compliance processes, all of which are critical in today’s fast-paced business environment.

Revenue
$65.8M
Customers
-
Year founded
2018
Funding
-
Team size
293
Growth
31.58%
9
Prove

New York, New York, United States

Prove is the modern way for businesses to enable their customers to prove their identities. Prove offers phone-centric solutions that enable its customers to acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy & consumer choice. Prove's solutions are used by more than 1,000 businesses across diversified industries, including banks, financial services, healthcare, insurance, and e-commerce. With 1 billion+ consumer and small business identity tokens under continuous management, Prove’s Phone-Centric Identity™ platform helps companies mitigate fraud while accelerating revenue and reducing operating costs across all channels. Prove’s omnichannel solutions are available in 195 countries.

Revenue
$63M
Customers
-
Year founded
2008
Funding
$155.1M
Team size
573
Growth
-
10
One Identity

Aliso Viejo, California, United States

Provider of an identity and access management platform intended to help organizations get identity and access management right. The company's identity and access management platform offers a portfolio of identity governance, access management and privileged management and identity as a service, enabling organizations to reach their full potential, unimpeded by security yet safeguarded against threats.

Revenue
$62.8M
Customers
7.5K
Year founded
2011
Funding
-
Team size
589
Growth
91.4%

Inclusion Criteria

- Must provide user authentication and authorization features. - Must support role-based access control (RBAC) for managing user permissions. - Must offer auditing and reporting capabilities to track user activities. - Should facilitate single sign-on (SSO) for seamless user experience across applications. - Not just focus on access management; must also enhance identity governance and compliance features.