Identity and access management %28iam%29 report from it central station 2017 11 18 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
239,537 professionals have used our research on 5,957 solutions.
Chart Key
Average Rating
Average rating based on reviews
Number of total page views
Number of times compared to another product
Total number of reviews on IT Central Station
Number of followers on IT Central Station
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in the category. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded

What is Identity and Access Management (IAM)?

When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.

Identity and Access Management (IAM) Reviews

Read reviews of Identity and Access Management (IAM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Identity and access management %28iam%29 report from it central station 2017 11 18 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
239,537 professionals have used our research on 5,957 solutions.
Identity and access management %28iam%29 report from it central station 2017 11 18 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
239,537 professionals have used our research on 5,957 solutions.

Identity and Access Management (IAM) Articles

A5223938 eed9 42af 9f16 9a9bd1568f21 avatar
Orlee Gillis
Community Mgr
Content and Community Manager
IT Central Station
Birzu alexandru adrian li?1414334311

ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed CyberArk Privileged Account Security: The ability to start the project, install and add...
Iftikhar iqbal li?1425300872
Professional Services Consultant
72d8f27d eba1 4479 90b2 f779bedd57b8 avatar
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Reviewed Oracle Identity Manager: Some of the valuable features are provisioning...
D3e3d3db 5533 4753 9c1c 07c0cd4d36e7 avatar
Cyberark Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
2f6ad1ac 3649 4caa 9b3f 6f0b55bcadb4 avatar
TOP 10
Senior IT Consultant
Reviewed Quest One Identity Manager: A portal for user requests and authorizations which...
Anonymous avatar x100
TOP 20
Lead Consultant
10+ years of experience in Information Security covering areas of both enterprise and consumer security – Identity & Access Management. Played various roles in last 10 years across Implementation, Architecting, Design & Development, Support, Pre-Sales, across multiple organizations. ... more>>
230c19d9 52e0 48ce ad3c d8e80c69f244 avatar
TOP 20
Senior Solution Consultant
Reviewed Quest ActiveRoles Server: It has very powerful native policies and scripts
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
Joe varkey li?1421655435
TOP 20
IAM Consultant
Specialties: Microsoft Forefront Identity Manager Microsoft Identity Lifecycle Manager Microsoft Active Directory Federation Services IBM Tivoli Access Manager IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Tivoli Directory Server IBM Tivoli Enterprise Single Sign... more>>
Reviewed Microsoft Bhold Forefront Identity Manager [EOL]: FIM leads to better security but work is needed on...
57252beb 9844 409c 9f4f d296bc4c0bf2 avatar
TOP 20
Senior Consultant
Reviewed IBM Tivoli Access Manager: Reverse proxy provides central control over...
6bb41855 55b4 4261 aa70 b355e0dbc66f avatar
TOP 20
Solution Consultant
Reviewed Quest ActiveRoles Server: Offers automatic provisioning for multiple...
92d6de44 1eee 47f0 8981 b796574d8ebc avatar
TOP 20
Identity Management Consultant
Reviewed Leiberman RED Identity Management: It allows us to enumerate all machines from an...
Ganesh kamble li?1414331258
Senior Technical Consultant
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products. Specialties: * Java * Oracle Application Development Framework (ADF) * Oracle Service Oriented Architecture... more>>
Mandar deshmukh li?1420496967
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products. Last 10+ years working in... more>>
Reviewed IBM Tivoli Access Manager: WebSEAL provides a large number of authentication...
Babel tommy li?1421349953
Special Consultant
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
Reviewer176052 li?1419819037
Profile Summary 10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications Experience Summary a) Total IT Experience - 10 Years b) Security... more>>
Venkat ananthakrishnan li?1423463744
Principal Consultant
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>
Anonymous avatar x100
Principal Consultant & Solutions Architect
Anonymous avatar x100
CyberArk Consultant
Reviewed CyberArk Privileged Account Security: The password management component (CPM) is the most...
Anonymous avatar x100
Tivoli Consultant
Reviewed IBM Tivoli Access Manager: AuthN and AuthZ mechanisms are built-in.
Anonymous avatar x100
Service Now Consultant
Reviewed IBM Tivoli Access Manager: Multiple instances per component can be installed...
Anonymous avatar x100
Tech Consulting Sr Associate
Anonymous avatar x100
Senior Technical Consultant
Anonymous avatar x100
SAP consultant
Reviewed SAP NetWeaver Identity Management: The power to implement a lot of functionality...
Anonymous avatar x100
Sr. OIM Consultant
Java/J2EE programming, Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance, Identity Management Administration and Development
Reviewed Oracle Identity Manager: I like the delegated administration, centralized...
Bilal essa li?1421420946
Sriram chandran li?1419170497
Senior Oracle Functional Consultant
Reviewed Oracle Identity and Access Management Suite: Automatic onboarding of employees and off boarding...
Anonymous avatar x100
Senior Technical Consultant
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management Specialties: IT

Sign Up with Email