No more typing reviews! Try our Samantha, our new voice AI agent.

What are your best practices for Identity and Access Management (IAM) in the Cloud?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 4
  • 109
PeerSpot user

6 Answers

Last answered May 20, 2022
LN
IDM Engineer at a tech services company with 51-200 employees
Real User
Feb 23, 2022
Search for a product comparison in Identity Management (IM)
Pramod Bhaskar - PeerSpot reviewer
Chief Technology Officer at ILANTUS Technologies
Vendor
May 20, 2022
rtechenthusiast85 - PeerSpot reviewer
Search Engine Optimization Specialist at LoginRadius
Vendor
May 19, 2022
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ModeratorTop 5
Feb 27, 2022
KZ
Senior Consultant at Golden Ideas
Consultant
Feb 24, 2022
JohnDoe113 - PeerSpot reviewer
- at a tech services company with 51-200 employees
Real User
Mar 9, 2022
Find out what your peers are saying about One Identity, Microsoft, SailPoint and others in Identity Management (IM). Updated: April 2026.
893,164 professionals have used our research since 2012.
Customer Identity and Access Management (CIAM)
CIAM solutions enhance user experience by ensuring secure access and identity management for customers. They are critical in safeguarding user data while providing seamless access to applications and services. Organizations leverage CIAM to streamline user authentication processes, allowing for personalized and secure user interactions. These solutions support scalable and customizable access control, integrating seamlessly with existing systems to enhance customer engagement, reduce...
Download Customer Identity and Access Management (CIAM) ReportRead more

Related Q&As