20 Most Promising Identity Governance & Administration Solution Providers - 2017
In the wake of growing cyber threats, establishing the identity of individuals has assumed paramount importance. While industries look toward deploying state-of-the-art technology solutions to secure their environment, combating the problem also requires robust policies governing the identity of users. With policy-based orchestration of user identity being the norm in enterprise corridors, vendors are racing against time to cater to the niche requirements of each enterprise.
Identity governance and administration (IGA) has matured significantly over the years—evidenced by the consistency and advancement visible in most product offerings. Vendors and solution providers are increasingly offering IGA functions as cloud-based services along with intuitive user interfaces that facilitate behavioral analytics to gain insights into the potential dangers lurking in a network. While the market is abuzz with solutions capable of ensuring compliance, automating threat responses, and so forth, identifying the apt product that addresses the requirements of an enterprise can be arduous.
The dynamism surrounding the IGA market has stepped up the activities in C-suites, with executives brainstorming over solutions most appropriate and valuable to them, besides being agile enough to suit the ever-changing cyber threat landscape. In order to simplify the task of finding best-in-class IGA solution providers, a distinguished panel comprising CIOs, CEOs, CTOs, analysts and the CIOReview editorial board has reviewed numerous companies and selected the outstanding ones. The featured firms demonstrate outstanding ability to innovate and customize solutions to suit clients’ requirements.
In this edition of CIOReview, we present to you 20 Most Promising Identity Governance and Administration Solution Providers - 2017.
|ANDE||Rapid DNA, a technology designed to maximize the impact of DNA identification to assist law enforcement, homeland defense, disaster victim identification, and the military|
|authen2cate||A provider of single sign-on, multi-factor authentication, and other identity and access management solutions|
|Avatier||Provides identity management and access governance solutions make organizations more secure and productive in the shortest time at the lowest costs|
|CoffeeBean Technology||Offers methodology based on the Social-ID for Customer Identity platform to create the customer identity and apply it successfully to business|
|Core Security||Provides a comprehensive suite of identity management and access governance solutions that help organizations minimize risk, streamline operations, and reduce cost|
|Duo||Provides solution to protect every user and get basic access controls, advanced administrative management, and user provisioning|
|ForgeRock||Provides solutions to secure digital identities for people, devices, and connected things online|
|Gigya||Gigya’s Customer Identity Management platform helps enterprises build great customer experiences at scale while balancing data privacy and security|
|Intensity Analytics||Recognizes human beings based on physical effort|
|Kisi||Provides cloud-based technology enabling secure physical access control systems for commercial facilities|
|Omada||Helps enterprises to manage identities across heterogeneous IT-systems and is acclaimed for its business-centric approach and high usability|
|OneVisage||Swiss-based authentication company, offering cutting-edge three-dimensional (3D) facial authentication solutions to financial services, Identity & Access Management providers and cyber-security integrators|
|Ping Identity||Provides centralized, fine-grained policy control over access to store identity and profile data|
|RSA Security||Provides solutions that help companies to simplify how access is governed and streamline access requests and fulfillment|
|SailPoint||SailPoint’s open identity platform gives enterprises the power to enter new markets, scale their workforces, embrace new technologies, innovate faster, and compete on a global basis|
|Secret Double Octopus||Password-free, keyless authentication technology to protect identity and data across cloud, mobile and IoT environments|
|SecureAuth||SecureAuth provides multi-factor authentication (MFA) and single sign-on (SSO) solutions using multi-layered adaptive authentication with a frictionless user experience|
|Sedicii||Establishes a secure platform for organizations to verify the identity of their customers|
|Trusted Key||Provides a blockchain-backed digital identity solution for secure password-less login, durable verified identity and fraud prevention|
|VASCO||Delivers complete and flexible industry-leading security solutions to safeguard critical systems access|