Identity and access management %28iam%29 report from it central station 2017 07 08 thumbnail thumbnail
Find out what your peers are saying about Oracle, CyberArk, CA Technologies and others in Identity and Access Management (IAM).
218,995 professionals have used our research on 5,617 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in the category. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded from the rankings.

What is Identity and Access Management (IAM)?

When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.


Identity and Access Management (IAM) Reviews

Read reviews of Identity and Access Management (IAM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Identity and access management %28iam%29 report from it central station 2017 07 08 thumbnail thumbnail
Find out what your peers are saying about Oracle, CyberArk, CA Technologies and others in Identity and Access Management (IAM).
218,995 professionals have used our research on 5,617 solutions.
Identity and access management %28iam%29 report from it central station 2017 07 08 thumbnail thumbnail
Find out what your peers are saying about Oracle, CyberArk, CA Technologies and others in Identity and Access Management (IAM).
218,995 professionals have used our research on 5,617 solutions.

Identity and Access Management (IAM) QuestionsAsk the community a question

Identity and Access Management (IAM) Articles

Birzu alexandru adrian li?1414334311
4,948

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed McAfee Complete Endpoint Protection: If a client needs new components, ePO helps them to...
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
247
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
72d8f27d eba1 4479 90b2 f779bedd57b8 avatar
3
TOP 10
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Reviewed Oracle Identity Manager: Some of the valuable features are provisioning...
D3e3d3db 5533 4753 9c1c 07c0cd4d36e7 avatar
83
Cyberark Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
Joe varkey li?1421655435
274
TOP 20
IAM Consultant
Specialties: Microsoft Forefront Identity Manager Microsoft Identity Lifecycle Manager Microsoft Active Directory Federation Services IBM Tivoli Access Manager IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Tivoli Directory Server IBM Tivoli Enterprise Single Sign... more>>
Reviewed Microsoft Bhold Forefront Identity Manager: FIM leads to better security but work is needed on...
Aa8f66af e2d8 4f86 acb0 ae06c9378862 avatar
193
TOP 20
Sr. Technical Consultant
Reviewed CyberArk Privileged Account Security: The integration of Auto IT provided the flexibility...
2f6ad1ac 3649 4caa 9b3f 6f0b55bcadb4 avatar
75
TOP 20
Senior IT Consultant
Reviewed Quest One Identity Manager: A portal for user requests and authorizations which...
Iftikhar iqbal li?1425300872
4
TOP 20
Professional Services Consultant
92d6de44 1eee 47f0 8981 b796574d8ebc avatar
18
TOP 20
Identity Management Consultant
Reviewed Lieberman Software Enterprise Random Password Manager: It allows us to enumerate all machines from an...
Ganesh kamble li?1414331258
652
Senior Technical Consultant
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products. Specialties: * Java * Oracle Application Development Framework (ADF) * Oracle Service Oriented Architecture... more>>
Mandar deshmukh li?1420496967
643
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products. Last 10+ years working in... more>>
Reviewed IBM Tivoli Access Manager: WebSEAL provides a large number of authentication...
Babel tommy li?1421349953
616
Special Consultant
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
Reviewer176052 li?1419819037
620
Profile Summary 10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications Experience Summary a) Total IT Experience - 10 Years b) Security... more>>
Venkat ananthakrishnan li?1423463744
846
Principal Consultant
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>
Anonymous avatar x100
10
Principal Consultant & Solutions Architect
Anonymous avatar x100
178
Security Technical Consultant
Reviewed CyberArk Privileged Account Security: It allows you to target application-level access as...
Anonymous avatar x100
18
CyberArk Consultant
Reviewed CyberArk Privileged Account Security: The password management component (CPM) is the most...
Anonymous avatar x100
9
Tivoli Consultant
Reviewed IBM Tivoli Access Manager: AuthN and AuthZ mechanisms are built-in.
Anonymous avatar x100
19
Service Now Consultant
Reviewed IBM Tivoli Access Manager: Multiple instances per component can be installed...
Anonymous avatar x100
823
Tech Consulting Sr Associate
Anonymous avatar x100
1,021
Senior Technical Consultant
Anonymous avatar x100
268
Sr. OIM Consultant
Java/J2EE programming, Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance, Identity Management Administration and Development
Reviewed Oracle Identity Manager: I like the delegated administration, centralized...
Bilal essa li?1421420946
729

2
Sriram chandran li?1419170497
573
Senior Oracle Functional Consultant
Reviewed Oracle Identity and Access Management Suite: Automatic onboarding of employees and off boarding...
Anonymous avatar x100
253
Senior Technical Consultant
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management Specialties: IT

Sign Up with Email