We just raised a $30M Series A: Read our story


User Activity

6 months ago
Pricing is done based on limited user base and after that per user with limited number of application integrated. if you will match for long term all the IDAM will cost same for mid size company with 5 years contract
7 months ago
There could be 2 types of action that can be taken to measure the data breach 1) Proactive, where management decides the policy and a team implements those policies to avoid a data breach. Like DlP, Firewall along with IDAM. 2) Passive: where you take action to avoid as…
Over 1 year ago
Answered a question: Is SSO safe?
Firstly let me assure you once you have SSO integration in place using good tool then there is no chance of hacking. If you still think it can be you can go for the MFA(Multi Factor Authentication) where each user will be asked to provide second authentication(ike OTP,Finger…


Oracle Identity Governance Logo
About 1 year ago
Oracle Identity Governance



Over 1 year ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)

About me

I have 10+ years of experience in consulting & implementing different identity governance tool . I have worked with more than various clients and provided best solution to their company integration and password services.
I am CISM certified , Certified Cyber Incident Response and Planning(CIPR) , Prince2 Practitioner and Prince2 Foundation

Interesting Projects and Accomplishments

7 months ago