Comparison of The Best Identity Management Tools & Vendors
To help you find the best identity management tool for your business, IT Central Station ranked them based on hundreds of real user reviews. These reviews cover all of the best IAM solutions, from our esteemed community of enterprise technology professionals. You'll find comparisons of pricing, performance, features, stability and many other criteria. Read below to find out what your peers have to say about identity and access management vendors such as CyberArk, Oracle, SailPoint, Keeper and others.
See all 84 solutions in Identity and Access Management (IAM)
Average rating based on reviews
Number of total page views
Number of times compared to another product
Total number of reviews on IT Central Station
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.
Comparison of The Best Identity Management Tools & Vendors
Technology Architect with over 16 Years of IT experience in software Industry in diverse areas like Reliability Engineering, Program,Project and Process Management, Team Management, Operations Management, Database Administration, Design, Development, System analysis and Study, Implementation,... more>>
LinkTo ►► email@example.com ◄◄
All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K
Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions.
CyberArk PAS v7.2, v8.2 and v9.7
-Application / Solution Design
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
10+ years of experience in Information Security covering areas of both enterprise and consumer security – Identity & Access Management. Played various roles in last 10 years across Implementation, Architecting, Design & Development, Support, Pre-Sales, across multiple organizations.
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
As a technical lead lead in Wipro, I am working with a team managing the identity and access for a secured environment for a banking client.
In total I have about 9 years of industry experience with Telecom and banking domains.
My niche is IBM Security Access Manager (WebSEAL) along with... more>>
Identity and Access management professional with 4 year and 3 months experience in the areas of Internet Security using IBM and Oracle tools and Technologies.
Engagement in some of the large scale environment like SBI General Insurance Corporation Ltd (INDIA), UK Asset Resolution (UK) and... more>>
Microsoft Forefront Identity Manager
Microsoft Identity Lifecycle Manager
Microsoft Active Directory Federation Services
IBM Tivoli Access Manager
IBM Tivoli Identity Manager
IBM Tivoli Federated Identity Manager
IBM Tivoli Directory Server
IBM Tivoli Enterprise Single Sign... more>>
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products.
* Oracle Application Development Framework (ADF)
* Oracle Service Oriented Architecture... more>>
Over 9+ years of experience with technical exposure in IDM and ERP solutions. Lead a team of IDM Developers before moving on to become a senior consultant. Have exposure of both CA and Oracle IDM Products
Specialties: Identity and Access Management. Information security. Governance.
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions
Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
• Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation
• An effective communicator with relationship management and problem solving skills
• Ability to... more>>
CISSP - Certified Information Systems Security Professional (ISC)² , certified IT security professional and having technological forte in the area of IDAM (Identity and Access Management) solutions, Federation , Web Services security, SOA and middle-ware security .
Worked extensively with... more>>
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications
a) Total IT Experience - 10 Years
b) Security... more>>
Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance,
Identity Management Administration and Development
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products.
Last 10+ years working in... more>>
8 years of experience in Identity and Access Management and Information Security Domain.
Key player in execution of IAM projects for multiple clients in various domains like telecom, retail, banking, insurance, health care.
Expertise in design and implementation of Identity and Access... more>>
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces
Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>
Not sure which Identity and Access Management (IAM) solution is right for you?Download our free Identity and Access Management (IAM) Report and find out what your peers are saying about CyberArk, Oracle, SailPoint, and more!