Identity and Access Management (IAM) - by Lawrence Pingree

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
Identity and Access Management (IAM) - by Lawrence Pingree Door Mind Map: Identity and Access Management (IAM) - by Lawrence Pingree

1. Identity Blockchain

1.1. 2Way.IO

1.2. airbitz

1.3. Block Armor

1.4. Blockstack

1.4.1. Open Source

1.5. hypr

1.6. ID.me

1.7. KYC-Chain

1.8. tradle.io

1.9. trunomi

1.10. uniquid

1.11. Uport

2. Identity governance and administration

2.1. CA Technologies

2.2. Evolveum

2.3. IBM Security

2.4. Oracle

2.5. RSA (Aveksa)

3. Privileged account management (PAM)

3.1. BeyondTrust

3.2. Lieberman Software

3.3. Cyber Ark

3.4. Dell

3.5. Centrify

4. Public Certificate Authorities

4.1. Comodo

4.2. Crosscert

4.3. Geotrust

4.4. Godaddy

4.5. Symantec (Formerly VeriSign)

5. User Authentication

5.1. Behavioral Authentication

5.1.1. Acceptto

5.1.2. Behaviosec

5.1.3. BioCatch

5.1.4. CallSign

5.1.5. Google

5.1.5.1. Trust API

5.1.6. ThreatMetrix

5.1.7. Trusona

5.2. Biometrics (biological measurements)

5.2.1. Behavioral

5.2.1.1. Typing rhythm/keystroke dynamics

5.2.1.1.1. Watchful Software

5.2.1.1.2. AuthenWare

5.2.1.1.3. CallSign

5.2.1.2. Voice recognition

5.2.1.2.1. Agnitio

5.2.1.2.2. Nuance

5.2.2. Biological

5.2.2.1. Face recognition

5.2.2.1.1. Sensible Vision

5.2.2.2. Fingerprint

5.2.2.2.1. Digital Persona

5.3. Tokens

5.3.1. OOB authentication

5.3.1.1. SMS

5.3.1.1.1. CallSign

5.3.1.2. Voice

5.3.1.2.1. CallSign

5.3.1.3. Push

5.3.1.3.1. Duo Security

5.3.1.4. Email

5.3.1.5. Social media

5.3.1.6. Passwordless

5.3.1.6.1. CallSign

5.3.2. OTP tokens

5.3.2.1. OTP hardware tokens

5.3.2.2. OTP software tokens for smart phones

5.3.2.2.1. EMC/RSA

5.3.2.2.2. Google

5.3.2.2.3. Symantec

5.3.2.2.4. Trusona

5.3.2.2.5. CallSign

5.3.3. X.509 tokens

5.3.4. Other tokens

5.3.4.1. ANECT AS - ALUCID

5.4. Wide-focus vendors

5.4.1. Alladin-RD

5.4.2. CA Technologies

5.4.3. CallSign

5.4.4. Duo Security

5.4.5. Entrust

5.4.6. Gemalto

5.4.7. HID Global

5.4.8. Okta

5.4.9. Ping

5.4.10. RSA

5.4.10.1. Adaptive Auth

5.4.11. Symantec

5.4.12. Technology Nexus

5.4.13. VASCO

5.5. Enterprise Password Managers

5.5.1. 1Password

5.5.2. Avatier

5.5.3. BeyondTrust

5.5.4. CyberArk

5.5.5. DashLane

5.5.6. Evolve IP

5.5.7. Kaseya

5.5.8. Keeper Security

5.5.9. LastPass

5.5.10. OneLogin

5.5.11. PassWork

5.5.12. RoboForm

5.5.13. SolarWinds

5.5.14. TeamsID

5.5.15. Thycotic

5.5.16. Trend Micro

5.5.17. Zoho

6. User Privilege Management

6.1. Appsense

6.1.1. http://www.appsense.com/

6.2. Ariella

6.2.1. http://www.arellia.com/

6.3. Avectco

6.3.1. http://www.avecto.com/

6.4. BeyondTrust

6.4.1. http://www.beyondtrust.com/

6.5. Centrify

6.5.1. http://www.centrify.com/

6.6. CionSystems

6.7. CrossIdeas

6.7.1. http://www.crossideas.com/

6.8. Dell

6.8.1. http://www.quest.com/desktop-authority-management-suite/

6.9. Lieberman Software

6.9.1. http://www.liebsoft.com/

6.10. Viewfinity

6.10.1. http://www.viewfinity.com/

7. Active Directory Defense

7.1. Acalvio

7.2. Crowdstrike

7.3. CyberArk

7.4. SentinelOne

7.5. Varonis

8. AD/Unix bridge

8.1. Centrify

9. Enterprise single sign-on (ESSO)

10. Externalized authorization management (EAM)

10.1. Axiomatics

10.2. Dell Quest (BitKoo)

10.3. Gluu

11. IAM as a Service

11.1. Centrify

11.2. IBM (Formerly Lighthouse Security)

11.3. Identity Automation

11.4. Intel

11.5. Okta

11.6. Password Bank

11.7. Ping Identity

11.8. Sailpoint

11.9. Symplifyed

11.10. iWelcome