Identity and Access Management (IAM) - by Lawrence Pingree

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
Identity and Access Management (IAM) - by Lawrence Pingree Door Mind Map: Identity and Access Management (IAM) - by Lawrence Pingree

1. Active Directory Defense

1.1. Acalvio

1.2. Crowdstrike

1.3. CyberArk

1.4. SentinelOne

1.5. Varonis

2. AD/Unix bridge

2.1. Centrify

3. Enterprise single sign-on (ESSO)

4. Externalized authorization management (EAM)

4.1. Axiomatics

4.2. Dell Quest (BitKoo)

4.3. Gluu

5. IAM as a Service

5.1. Centrify

5.2. IBM (Formerly Lighthouse Security)

5.3. Identity Automation

5.4. Intel

5.5. Okta

5.6. Password Bank

5.7. Ping Identity

5.8. Sailpoint

5.9. Symplifyed

5.10. iWelcome

6. Identity governance and administration

6.1. CA Technologies

6.2. Evolveum

6.3. IBM Security

6.4. Oracle

6.5. RSA (Aveksa)

7. Privileged account management (PAM)

7.1. BeyondTrust

7.2. Lieberman Software

7.3. Cyber Ark

7.4. Dell

7.5. Centrify

8. Public Certificate Authorities

8.1. Comodo

8.2. Crosscert

8.3. Geotrust

8.4. Godaddy

8.5. Symantec (Formerly VeriSign)

9. User Authentication

9.1. Behavioral Authentication

9.1.1. Acceptto

9.1.2. Behaviosec

9.1.3. BioCatch

9.1.4. CallSign

9.1.5. Google

9.1.5.1. Trust API

9.1.6. ThreatMetrix

9.1.7. Trusona

9.2. Biometrics (biological measurements)

9.2.1. Behavioral

9.2.1.1. Typing rhythm/keystroke dynamics

9.2.1.1.1. Watchful Software

9.2.1.1.2. AuthenWare

9.2.1.1.3. CallSign

9.2.1.2. Voice recognition

9.2.1.2.1. Agnitio

9.2.1.2.2. Nuance

9.2.2. Biological

9.2.2.1. Face recognition

9.2.2.1.1. Sensible Vision

9.2.2.2. Fingerprint

9.2.2.2.1. Digital Persona

9.3. Tokens

9.3.1. OOB authentication

9.3.1.1. SMS

9.3.1.1.1. CallSign

9.3.1.2. Voice

9.3.1.2.1. CallSign

9.3.1.3. Push

9.3.1.3.1. Duo Security

9.3.1.4. Email

9.3.1.5. Social media

9.3.1.6. Passwordless

9.3.1.6.1. CallSign

9.3.2. OTP tokens

9.3.2.1. OTP hardware tokens

9.3.2.2. OTP software tokens for smart phones

9.3.2.2.1. EMC/RSA

9.3.2.2.2. Google

9.3.2.2.3. Symantec

9.3.2.2.4. Trusona

9.3.2.2.5. CallSign

9.3.3. X.509 tokens

9.3.4. Other tokens

9.3.4.1. ANECT AS - ALUCID

9.4. Wide-focus vendors

9.4.1. Alladin-RD

9.4.2. CA Technologies

9.4.3. CallSign

9.4.4. Duo Security

9.4.5. Entrust

9.4.6. Gemalto

9.4.7. HID Global

9.4.8. Okta

9.4.9. Ping

9.4.10. RSA

9.4.10.1. Adaptive Auth

9.4.11. Symantec

9.4.12. Technology Nexus

9.4.13. VASCO

9.5. Enterprise Password Managers

9.5.1. 1Password

9.5.2. Avatier

9.5.3. BeyondTrust

9.5.4. CyberArk

9.5.5. DashLane

9.5.6. Evolve IP

9.5.7. Kaseya

9.5.8. Keeper Security

9.5.9. LastPass

9.5.10. OneLogin

9.5.11. PassWork

9.5.12. RoboForm

9.5.13. SolarWinds

9.5.14. TeamsID

9.5.15. Thycotic

9.5.16. Trend Micro

9.5.17. Zoho

10. User Privilege Management

10.1. Appsense

10.1.1. http://www.appsense.com/

10.2. Ariella

10.2.1. http://www.arellia.com/

10.3. Avectco

10.3.1. http://www.avecto.com/

10.4. BeyondTrust

10.4.1. http://www.beyondtrust.com/

10.5. Centrify

10.5.1. http://www.centrify.com/

10.6. CionSystems

10.7. CrossIdeas

10.7.1. http://www.crossideas.com/

10.8. Dell

10.8.1. http://www.quest.com/desktop-authority-management-suite/

10.9. Lieberman Software

10.9.1. http://www.liebsoft.com/

10.10. Viewfinity

10.10.1. http://www.viewfinity.com/

11. Identity Blockchain

11.1. 2Way.IO

11.2. airbitz

11.3. Block Armor

11.4. Blockstack

11.4.1. Open Source

11.5. hypr

11.6. ID.me

11.7. KYC-Chain

11.8. tradle.io

11.9. trunomi

11.10. uniquid

11.11. Uport