IAM Product Overwiev
Identity & Access Management Products and Vendors
The market for IAM products has developed considerably in recent years. Today, products offer functionalities that 15 years ago one did not even dare to dream of. Where at that time a simple Meta Directory was already called Identity Management, today mature applications with workflows and uniform customer login are available for portals / web access as well as business role management. Whereas in the past one had to content oneself with reports of the current authorizations and find out deviations from the target status oneself, today one receives an audit that specifically shows the deviations between the target and the current status.
The allocation of rights has also undergone many changes. The rule- and workflow-based Identity Management that used to be common is now being replaced by role-based IDM (RBAC). This means that new, highly complex rules no longer have to be created for every special case such as holiday replacement or project assignment.
But even if the products have developed enormously in recent years, one thing remains the same: Each product has specific strengths and weaknesses. Depending on the task of the company, some products are better suited than others, for example because they cover more of the desired range of functions. Without already having worked with various products, it is almost impossible to recognize and evaluate the detailed functionality of a product or to recognize its disadvantages. Figuring out whether a competing product is not more suitable is difficult.
deron knows the products of the different manufacturers and their advantages and disadvantages. We are happy to bring this knowledge to our consulting, analysis and conception without any restrictions. Our consultants have specialized in teams on different IAM products from manufacturers.
Among other things, we have know-how regarding the following Identity & Access Management products (list is updated regularly):
Akamai
- Janrain Identity Cloud
ARCON
- ARCON Privileged Access Management
ATOS/Evidian (formerly Siemens)
- DirX Identity (Identity Management und Governance)
- DirX Access (Identity Federation und Access Management)
- DirX Audit (Identity Analytics und Intelligence)
- DirX Directory (High-end LDAP/X.500 Directory Server)
Auth0
- Auth0 Customer Identity Management
Avatier
- Avatier Identity Anywhere
BetaSystems
- Garancy IAM Suite
BeyondTrust
- BeyondTrust Password Safe
BMC
- BMC Remedy Identity Management Suite
CA Technologies
- CA Identity Suite
- CA Identity Manager
- CA Identity Directory
- Layer 7 Privileged Access Manager
Core Security (Courion)
- Core Access Assurance Suite
- Core Password Management
CYBERARK
- Core Privileged Access Security
- Application Access Manager
- Endpoint Privilege Manager
direkt Gruppe Hamburg (econet)
- Identity & Provisioning Manager
EmpowerID (formerly The Dot Net Factory)
Ergon Informatik
Fischer International
- Fischer Identity Suite (formerly Fischer Automated Role & Account Management)
ForgeRock
- Digital Identity and Access Management Platform
Hitachi ID Systems
- Hitachi ID Identity Manager
- Hitachi ID Password Manager
- Hitachi ID Privileged Access Manager
IBM
- IBM Security Identity Governance and Intelligence (IGI)
- IBM Cloud Identity
- IBM Security Directory Suite (formerly IBM Tivoli Identity Manager)
ILEX International
- Meibo Identity Management
iSM Secu-Sys
- bi-Cube IAM
ITSENSE
- CoreOne Suite (formerly: IT Management Suite)
iWelcome
- iWelcome
JumpCloud
- JumpCloud – Access Control
- JumpCloud – Identity Management
KEYCLOAK
- KEYCLOAK
LastPass
- LastPass Identity
ManageEngine
- ManageEngine Password Manager Pro
Mateso
- Password Safe
Micro Focus (formerly Attachmate, NetIQ, Novell)
- NetIQ Identity Manager (formerly Novell Identity Manager, Novell Nsure Identity Manager, Novell DirXML)
- NetIQ Identity Governance
- NetIQ Access Manager
- NetIQ Privileged Account Manager
Microsoft (Bhold)
- Microsoft Identity Manager 2016 (MIM)
(formerly Forefront Identity Manager (FIM), ILM, MIIS) - Microsoft BHOLD Suite
- Azure Active Directory B2C
okta
- Customer Identity
- Workforce Identity
Omada
- Omada Identity Suite (OIS)
One Identity (vormals Quest, Dell, Völcker Informatik)
- Cloud Access Manager
- Identity Manager
- One Identity Safeguard
OneLogin
- Workforce Identity
- Customer Identity
OpenIAM
- Open IAM Identity Manager
- Open IAM Access Manager
Oracle (vormals SUN Microsystems)
- Oracle Identity Management Platform
(formerly Oracle Waveset, Sun Identity Manager
und Oracle Access Manager, Sun Access Manager)
Ping Identity
- PingID
- PingAccess
- PingFederate
- PingOne
RSA
- RSA SecurID Suite
(formerly RSA Identity Management and Governance, Aveksa Enterprise Access Covernance Suite, Aveksa Compliance Manager, Aveksa Role Manager, Aveksa Access Request & Change Manager, Aveksa Data Access Governance)
SailPoint
- Identity Governance Platform
- IdentityIQ
- IdentityAl
- IdentityNow
- SecurityIQ
Saleforce
SAP
- SAP Identity Management
- SAP Customer Data Cloud (Gigya)
SecureEnds
- SecureEnds IAM
- SecureEnds IGA
Simeio Solutions
- Simeio Identity & Access Governance Service (IGA)
SIVIS
- SIVIS Suite
Soffid
- Identity & Access Management
SystemFrontier
tenhold Software
- tenhold
Thales
- SafeNet Trusted Access
Thycotic
- Thycotic Secret Server
verimi
WALLIX
- WALLIX Bastion
WSO2
- WSO2 Identity Server
Xiting AG
Zoho Vault
Information for Manufacturers:
If your product or platform is not listed on this page, you are welcome to contact us at marketing@deron.de .