Identity and access management %28iam%29 report from it central station 2017 09 16 thumbnail
Find out what your peers are saying about Oracle, CyberArk, SailPoint and others in Identity and Access Management (IAM).
227,901 professionals have used our research on 5,829 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in the category. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded

What is Identity and Access Management (IAM)?

When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.


Identity and Access Management (IAM) Reviews

Read reviews of Identity and Access Management (IAM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Identity and access management %28iam%29 report from it central station 2017 09 16 thumbnail
Find out what your peers are saying about Oracle, CyberArk, SailPoint and others in Identity and Access Management (IAM).
227,901 professionals have used our research on 5,829 solutions.
Identity and access management %28iam%29 report from it central station 2017 09 16 thumbnail
Find out what your peers are saying about Oracle, CyberArk, SailPoint and others in Identity and Access Management (IAM).
227,901 professionals have used our research on 5,829 solutions.

Identity and Access Management (IAM) Questions

Identity and Access Management (IAM) Articles

A5223938 eed9 42af 9f16 9a9bd1568f21 avatar
Orlee Gillis
Community Mgr
Content and Community Manager
IT Central Station
Birzu alexandru adrian li?1414334311
5,261

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Iftikhar iqbal li?1425300872
27
Professional Services Consultant
72d8f27d eba1 4479 90b2 f779bedd57b8 avatar
26
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Reviewed Oracle Identity Manager: Some of the valuable features are provisioning...
D3e3d3db 5533 4753 9c1c 07c0cd4d36e7 avatar
97
Cyberark Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
2f6ad1ac 3649 4caa 9b3f 6f0b55bcadb4 avatar
92
TOP 20
Senior IT Consultant
Reviewed Quest One Identity Manager: A portal for user requests and authorizations which...
Anonymous avatar x100
26
TOP 20
Lead Consultant
10+ years of experience in Information Security covering areas of both enterprise and consumer security – Identity & Access Management. Played various roles in last 10 years across Implementation, Architecting, Design & Development, Support, Pre-Sales, across multiple organizations. ... more>>
Contribute to other reviews to go up the charts. Be seen as an expert in the community!
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
256
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
Joe varkey li?1421655435
279
TOP 20
IAM Consultant
Specialties: Microsoft Forefront Identity Manager Microsoft Identity Lifecycle Manager Microsoft Active Directory Federation Services IBM Tivoli Access Manager IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Tivoli Directory Server IBM Tivoli Enterprise Single Sign... more>>
Reviewed Microsoft Bhold Forefront Identity Manager: FIM leads to better security but work is needed on...
57252beb 9844 409c 9f4f d296bc4c0bf2 avatar
21
TOP 20
Senior Consultant
Reviewed IBM Tivoli Access Manager: Reverse proxy provides central control over...
6bb41855 55b4 4261 aa70 b355e0dbc66f avatar
7
TOP 20
Solution Consultant
Reviewed Quest ActiveRoles Server: Offers automatic provisioning for multiple...
92d6de44 1eee 47f0 8981 b796574d8ebc avatar
20
TOP 20
Identity Management Consultant
Reviewed Lieberman Software Enterprise Random Password Manager: It allows us to enumerate all machines from an...
Ganesh kamble li?1414331258
652
Senior Technical Consultant
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products. Specialties: * Java * Oracle Application Development Framework (ADF) * Oracle Service Oriented Architecture... more>>
Mandar deshmukh li?1420496967
643
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products. Last 10+ years working in... more>>
Reviewed IBM Tivoli Access Manager: WebSEAL provides a large number of authentication...
Babel tommy li?1421349953
616
Special Consultant
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
Reviewer176052 li?1419819037
621
Profile Summary 10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications Experience Summary a) Total IT Experience - 10 Years b) Security... more>>
Venkat ananthakrishnan li?1423463744
857
Principal Consultant
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>
Anonymous avatar x100
18
Principal Consultant & Solutions Architect
Anonymous avatar x100
179
Security Technical Consultant
Reviewed CyberArk Privileged Account Security: It allows you to target application-level access as...
Anonymous avatar x100
27
CyberArk Consultant
Reviewed CyberArk Privileged Account Security: The password management component (CPM) is the most...
Anonymous avatar x100
12
Tivoli Consultant
Reviewed IBM Tivoli Access Manager: AuthN and AuthZ mechanisms are built-in.
Anonymous avatar x100
21
Service Now Consultant
Reviewed IBM Tivoli Access Manager: Multiple instances per component can be installed...
Anonymous avatar x100
826
Tech Consulting Sr Associate
Anonymous avatar x100
1,039
Senior Technical Consultant
Anonymous avatar x100
8
SAP consultant
Reviewed SAP NetWeaver Identity Management: The power to implement a lot of functionality...
Anonymous avatar x100
268
Sr. OIM Consultant
Java/J2EE programming, Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance, Identity Management Administration and Development
Reviewed Oracle Identity Manager: I like the delegated administration, centralized...
Bilal essa li?1421420946
730

2
Sriram chandran li?1419170497
573
Senior Oracle Functional Consultant
Reviewed Oracle Identity and Access Management Suite: Automatic onboarding of employees and off boarding...
Anonymous avatar x100
253
Senior Technical Consultant
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management Specialties: IT

Sign Up with Email