Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
288,073 professionals have used our research since 2012.
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
288,073 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Number of total page views
Number of times compared to another product
Total number of reviews on IT Central Station
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

What is Identity and Access Management (IAM)?

When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.

Comparison of The Best Identity Management Tools & Vendors

Q&A Forum

Identity and Access Management (IAM) Articles

Operations Engineering Manager
Technology Architect with over 16 Years of IT experience in software Industry in diverse areas like Reliability Engineering, Program,Project and Process Management, Team Management, Operations Management, Database Administration, Design, Development, System analysis and Study, Implementation,... more>>
InfoSec Consultant
InfoSec Consultant - Account & Network Security CyberArk Vault Admin CyberArk Certified Professional Partner CyberArk Certified Sales Professional - CCSP Trainer, Internal Facilitator - Technology & Product Hardware Specialist White Hat - Ethical - Information Security Magician -... more>>
Reviewed Quest One Identity Manager: Allows for large customization. Needs to provide a...
CyberArk Consultant
LinkTo ►► ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Access Security: Helped us to identify, store, protect, and monitor...
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed Symantec Data Loss Prevention: Data Insight helps clients gain visibility over data...
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions. CyberArk PAS v7.2, v8.2 and v9.7 -Application / Solution Design -Implementation Security Solutions: -Identity... more>>
Reviewed CyberArk Privileged Access Security: Provides automatic password management. We can...
Global Privilege Access Management Technical Architect
CyberArk Privilege Access Management Architect
Reviewed CyberArk Privileged Access Security: All access to our servers, by both staff and...
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Access Security: Can provide transparent connection to targeted...
TOP 10
Lead Consultant
10+ years of experience in Information Security covering areas of both enterprise and consumer security – Identity & Access Management. Played various roles in last 10 years across Implementation, Architecting, Design & Development, Support, Pre-Sales, across multiple organizations. ... more>>
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Access Security: It is clientless, and does not require any...
Technical Lead
As a technical lead lead in Wipro, I am working with a team managing the identity and access for a secured environment for a banking client. In total I have about 9 years of industry experience with Telecom and banking domains. My niche is IBM Security Access Manager (WebSEAL) along with... more>>
Reviewed IBM Tivoli Access Manager: Has provided more secure computing. Unfortunately,...
Senior Software Engineer
Identity and Access management professional with 4 year and 3 months experience in the areas of Internet Security using IBM and Oracle tools and Technologies. Engagement in some of the large scale environment like SBI General Insurance Corporation Ltd (INDIA), UK Asset Resolution (UK) and... more>>
Reviewed IBM Tivoli Identity Manager: It is one of the best available products in the...
TOP 20
IAM Consultant
Specialties: Microsoft Forefront Identity Manager Microsoft Identity Lifecycle Manager Microsoft Active Directory Federation Services IBM Tivoli Access Manager IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Tivoli Directory Server IBM Tivoli Enterprise Single Sign... more>>
Reviewed Microsoft Bhold Forefront Identity Manager [EOL]: FIM leads to better security but work is needed on...
Senior Technical Consultant
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products. Specialties: * Java * Oracle Application Development Framework (ADF) * Oracle Service Oriented Architecture... more>>
Reviewed Oracle Identity Manager (Oracle IAM): Good solution for mid and large level organizations...
Senior Infrastructure Engineer
Over 9+ years of experience with technical exposure in IDM and ERP solutions. Lead a team of IDM Developers before moving on to become a senior consultant. Have exposure of both CA and Oracle IDM Products Specialties: Identity and Access Management. Information security. Governance. Product... more>>
Reviewed CA Identity Manager (CA IAM): The GUI provides user-account centralization and...
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Reviewed Oracle Identity Manager (Oracle IAM): Some of the valuable features are provisioning...
Cyber Security Consultant
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
Reviewed CyberArk Privileged Access Security: I can customize it to meet our customers'...
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Access Security: The combination of CPM and PSM resolves a lot of use...
Senior Consultant
CISSP - Certified Information Systems Security Professional (ISC)² , certified IT security professional and having technological forte in the area of IDAM (Identity and Access Management) solutions, Federation , Web Services security, SOA and middle-ware security . Worked extensively with... more>>
Reviewed IBM Tivoli Access Manager: We're able to generate user accounts much quicker...
Special Consultant
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
Working on Identity and Access Management
To grow up with a professionally managed learning organization and work in a challenging environment requiring constant development of fresh skills and utilize my existing skills to achieve goals
Reviewed Microsoft Bhold Forefront Identity Manager [EOL]: FIM 2010 SP1 is a good product for all those...
TOP 20
Profile Summary 10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications Experience Summary a) Total IT Experience - 10 Years b) Security... more>>
Reviewed CA Identity Manager (CA IAM): Setup is considered straightforward due to a wizard...
Sr. OIM Consultant
Java/J2EE programming, Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance, Identity Management Administration and Development
Reviewed Oracle Identity Manager (Oracle IAM): I like the delegated administration, centralized...
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products. Last 10+ years working in... more>>
Reviewed IBM Tivoli Access Manager: WebSEAL provides a large number of authentication...
Security Solution Specialist
8 years of experience in Identity and Access Management and Information Security Domain. Key player in execution of IAM projects for multiple clients in various domains like telecom, retail, banking, insurance, health care. Expertise in design and implementation of Identity and Access... more>>
Reviewed IBM Tivoli Identity Manager: It needs a business user oriented UI but the...
Senior Technical Consultant
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management Specialties: IT
Reviewed CA Identity Manager (CA IAM): Better recovery for the app server with the DB...
Principal Consultant
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>

Sign Up with Email