1. Active Directory Defense
1.1. Acalvio
1.2. Crowdstrike
1.3. CyberArk
1.4. SentinelOne
1.5. Varonis
2. AD/Unix bridge
2.1. Centrify
3. Enterprise single sign-on (ESSO)
4. Externalized authorization management (EAM)
4.1. Axiomatics
4.2. Dell Quest (BitKoo)
4.3. Gluu
5. IAM as a Service
5.1. Centrify
5.2. IBM (Formerly Lighthouse Security)
5.3. Identity Automation
5.4. Intel
5.5. Okta
5.6. Password Bank
5.7. Ping Identity
5.8. Sailpoint
5.9. Symplifyed
5.10. iWelcome
6. Identity governance and administration
6.1. CA Technologies
6.2. Evolveum
6.3. IBM Security
6.4. Oracle
6.5. RSA (Aveksa)
7. Privileged account management (PAM)
7.1. BeyondTrust
7.2. Lieberman Software
7.3. Cyber Ark
7.4. Dell
7.5. Centrify
8. Public Certificate Authorities
8.1. Comodo
8.2. Crosscert
8.3. Geotrust
8.4. Godaddy
8.5. Symantec (Formerly VeriSign)
9. User Authentication
9.1. Behavioral Authentication
9.1.1. Acceptto
9.1.2. Behaviosec
9.1.3. BioCatch
9.1.4. CallSign
9.1.5. Google
9.1.5.1. Trust API
9.1.6. ThreatMetrix
9.1.7. Trusona
9.2. Biometrics (biological measurements)
9.2.1. Behavioral
9.2.1.1. Typing rhythm/keystroke dynamics
9.2.1.1.1. Watchful Software
9.2.1.1.2. AuthenWare
9.2.1.1.3. CallSign
9.2.1.2. Voice recognition
9.2.1.2.1. Agnitio
9.2.1.2.2. Nuance
9.2.2. Biological
9.2.2.1. Face recognition
9.2.2.1.1. Sensible Vision
9.2.2.2. Fingerprint
9.2.2.2.1. Digital Persona
9.3. Tokens
9.3.1. OOB authentication
9.3.1.1. SMS
9.3.1.1.1. CallSign
9.3.1.2. Voice
9.3.1.2.1. CallSign
9.3.1.3. Push
9.3.1.3.1. Duo Security
9.3.1.4. Email
9.3.1.5. Social media
9.3.1.6. Passwordless
9.3.1.6.1. CallSign
9.3.2. OTP tokens
9.3.2.1. OTP hardware tokens
9.3.2.2. OTP software tokens for smart phones
9.3.2.2.1. EMC/RSA
9.3.2.2.2. Google
9.3.2.2.3. Symantec
9.3.2.2.4. Trusona
9.3.2.2.5. CallSign
9.3.3. X.509 tokens
9.3.4. Other tokens
9.3.4.1. ANECT AS - ALUCID
9.4. Wide-focus vendors
9.4.1. Alladin-RD
9.4.2. CA Technologies
9.4.3. CallSign
9.4.4. Duo Security
9.4.5. Entrust
9.4.6. Gemalto
9.4.7. HID Global
9.4.8. Okta
9.4.9. Ping
9.4.10. RSA
9.4.10.1. Adaptive Auth
9.4.11. Symantec
9.4.12. Technology Nexus
9.4.13. VASCO
9.5. Enterprise Password Managers
9.5.1. 1Password
9.5.2. Avatier
9.5.3. BeyondTrust
9.5.4. CyberArk
9.5.5. DashLane
9.5.6. Evolve IP
9.5.7. Kaseya
9.5.8. Keeper Security
9.5.9. LastPass
9.5.10. OneLogin
9.5.11. PassWork
9.5.12. RoboForm
9.5.13. SolarWinds
9.5.14. TeamsID
9.5.15. Thycotic
9.5.16. Trend Micro
9.5.17. Zoho
10. User Privilege Management
10.1. Appsense
10.1.1. http://www.appsense.com/
10.2. Ariella
10.2.1. http://www.arellia.com/
10.3. Avectco
10.3.1. http://www.avecto.com/
10.4. BeyondTrust
10.4.1. http://www.beyondtrust.com/
10.5. Centrify
10.5.1. http://www.centrify.com/
10.6. CionSystems
10.7. CrossIdeas
10.7.1. http://www.crossideas.com/
10.8. Dell
10.8.1. http://www.quest.com/desktop-authority-management-suite/
10.9. Lieberman Software
10.9.1. http://www.liebsoft.com/
10.10. Viewfinity
10.10.1. http://www.viewfinity.com/
11. Identity Blockchain
11.1. 2Way.IO
11.2. airbitz
11.3. Block Armor
11.4. Blockstack
11.4.1. Open Source