The number of tools for IT Ops professionals to choose from is overwhelming. For this reason, we created the periodic table of IT Ops tools to better define, organize, and explain the IT Ops tooling landscape. It is our hope that it will help IT professionals find, explore, and choose tools for their future IT Ops stack.
In a portion of this table we dive into Identity and Access Management tools specifically. Below you will find a list of the top identity and access management tools per the interactions we measure on the table.
What is IdM / IaM?
Identity management (IdM), also known as identity and access management (IaM) is, in computer security, the security and business discipline that enables the right individuals to access the right resources at the right times and for the right reasons. It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements. Identity-management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications. IdM covers issues such as how users gain an identity, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
The best IdM / IaM tools:
Centrify is a company that offers Identity and Access Management and Privileged Identity Management to secure access across computer network and cloud computing environments. The Centrify Identity Platform includes Application Services, Endpoint Services, Infrastructure Services and Analytics Services, protects against the leading point of attack used in a data breach ― compromised credentials — by […]
CyberArk is a publicly traded information security company offering Privileged Account Security. The company is focused on delivering a new category of targeted security solutions that help clients stop reacting to cyber threats and get ahead of them, preventing attack escalation before business harm is done. CyberArk’s Privileged Account Security product offers the following features: […]
Okta is an integrated identity and mobility management service. Built from the ground up in the cloud, Okta securely and simply connects people to their applications from any device, anywhere, at anytime. Okta integrates with existing directories and identity systems, as well as thousands of on premises, cloud and mobile applications, and runs on a […]
OneLogin, Inc. is a cloud-based identity and access management (IAM) provider focused on selling to businesses and other organizations. The company’s goals are to use IAM to secure user access to applications and devices, reduce IT time on user on-boarding and off-boarding, and increase end user productivity through single sign-on (SSO).
RSA Security is a provider of security solutions for business acceleration and security activities. RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution that lets organizations consistently and centrally enforce dynamic risk-driven access policies aimed at providing continuous, seamless authentication.
SailPoint is an identity and access management provider that helps organizations deliver and manage user access from any device. The SailPoint platform offers four distinct products and solutions, including IdentityIQ.
View the periodic table here