Identity and Access Management in Asia-Pacific

Comparing 130 vendors in Identity and Access Management across 71 criteria.
All vendors(20)
Filters
Reset
19
14
11
17
15
12
16
20
16
15
18
14
20
11
20
11
14
17
17
17
18
9
5
18
15
15
15
Selected by small-360Analysts

RSA SecurID Access  delivers constant access assurance for enterprises to confirm that users across the organization have the proper level of access. By providing visibility across islands of identity in the blended cloud and on-premises environment, RSA Identity Governance and Lifecycle authorizes business users to take action swiftly and easily to address risky access situations with the highest business impact in order to reduce business risk and ensure compliance.

Read less Read more
Selected by small-360Analysts

Cloud-ready Zero Trust Privilege is developed to manage the basic use case of privileged access management (PAM), which concedes access to privileged user accounts via a shared account, password, or applications passwords, and secrets vaults, as well as securing remote access. Centrify Privileged Access Service permits all the above as well as secure administrative access via the jump box, workflow-driven access requests, and approvals as well as multi-factor-authentication (MFA) at the vault.

Read less Read more
5

Okta, Inc. is one of the prominent providers of identity and mobility management solutions for mobiles and cloud enterprises.  The company provides cloud application management services with a strong focus on Customer Relationship Management (CRM). The company also offers identity, security, digital businesses, and mobility solutions.

Read less Read more

IBM provides easy integration and customization capabilities in its offerings such as customer queries which are resolved on priority. It allows access rights, provides single sign-on from any device, enhances security with multi-factor authentication, enables user lifecycle management, and protects privileged accounts.

Read less Read more
4.7 Online

Oracle Identity Management aims to empower customers to manage internal and external users, secure corporate information from potential software threats, and streamline compliance initiatives. Oracle’s continuous focus on innovation is indicated by the launch of industry and business function-specific solutions.

Read less Read more
Hitachi ID Identity Manager offers comprehensive identity management and access governance, privileged access management, and password management solutions. It advances IT security, supports internal controls and regulatory compliances, lowers access administration and IT support cost, and improves user services. Hitachi ID Identity Manager grants and cancels access for both on-premises and cloud-hosted systems and applications.
Read less Read more
4.1

OneLogin's identity management solution allows organizations to function at extreme speed, simultaneously providing the integrity that confers insights and governance and minimizes risk. OneLogin is a thought leader in authentication with plans to extend mobility support.

Read less Read more

Dell Identity Manager eliminates the difficulties and long processes that are often needed to govern identities, manage privileged accounts, and controls access. Dell One Identity solutions help in simplifying and attaining business agility while addressing identity and access management (IAM) challenges.

Read less Read more

Microsoft Corporation is a global provider of identity & access management solutions. The company's on-premises identity & access management solutions help businesses in synchronizing identities between directories, data bases, and applications. It also provides the authentication of password and certificate management. Microsoft, with its vast identity & access management solutions portfolio, caters the needs of customers.

Read less Read more

BeyondTrust Privileged Access Management solutions offer the exposure and control that is required to reduce risk, achieve least privilege, and gain operational efficiency. The company also offers the most seamless approach to prevent data breaches related to stolen credentials, misused privileges, and compromised remote access. The company’s privilege access management solution targets the special needs for any account managed by an organization.

Read less Read more

Salesforce Identity Connect allows managing AD users and Salesforce users simultaneously. It can organize Identity Connect to enable AD users access to their Salesforce orgs without logging in again. Salesforce identity event logs for creating reports and dashboards on single sign-on (SSO) and connected app usage.

Read less Read more

SailPoint Predictive Identity leverages the power of AI and machine learning to deliver the next-generation identity. It integrates with all applications and data in even the most compound, hybrid IT environment, and learns how an organization works to provide recommendations that help in making smart access decisions.

Read less Read more

LoginRadius Identity Platform offers a comprehensive variety of customer registration and authentication options for the right balance between customer experience and security. It also offers Multi-Factor Authentication and Risk-Based Authentication to ensure that customers get the right level of security while preserving a simple online experience.

Read less Read more

Akamai Technologies offers accessibility and gathers user data for marketing analysis. It delivers all features expected in an advanced CIAM solution. Akamai Identity Cloud is established and highly scalable and considered by enterprises with high availability, GDPR-compliant consent management, and complete marketing analytics features.

Read less Read more

Zoho Identity Manager Plus from the ManageEngine offers end users one-click access to the applications they need and permits IT admins to manage and monitor application access from one central console.

Read less Read more

Micro Focus helps organizations to provide their users with instant access to all the resources required. The company’s IAM solutions make it easier for users to remember their passwords and gain instant access to the resources. The solutions also enable businesses to control and monitor privileged user access and enhances authentication without impacting productivity.

Read less Read more

CyberArk defend, manage and review user and application credentials, deliver least privilege access, control applications on endpoints and servers, and protect, monitor, and analyze all privileged activity and proactively notifying on anomalous behaviour. It offers comprehensive readymade solution to defend, monitor, identify and respond in a tamper-proof, scalable and built for complex distributed environments to provide the highest security from insider and advanced threats.

Read less Read more
Avatier AIMS offers easily manageable user title access that helps in providing automated understanding to user access if any of entitlements are updated. It allows for real-time updates and saves the extra time for users having to re-request the new access.
Read less Read more

SAP installs identity and access management (IAM) in complex on-premise and cloud environments with the SAP Cloud Identity Access Governance software. It can improve IAM practices with an in-built, dashboard-driven interface, and a simple single sign-on (SSO) experience in the cloud.

Read less Read more

WatchGuard integrates identity and access management abilities, with features focused on the combination between the two. WatchGuard SSL 2.0 makes it easier for organizations to control access to the required resources at any given time, with powerful integration tools, enhanced security, and reporting technology.

Read less Read more