Identity and Access Management (IAM)

Get Started. It's Free
or sign up with your email address
Rocket clouds
Identity and Access Management (IAM) by Mind Map: Identity and Access Management (IAM)

1. AD/Unix bridge

1.1. Centrify

2. Enterprise single sign-on (ESSO)

3. Externalized authorization management (EAM)

3.1. Axiomatics

3.2. Dell Quest (BitKoo)

4. IAM as a Service

4.1. Centrify

4.2. IBM (Formerly Lighthouse Security)

4.3. Identity Automation

4.4. Intel

4.5. Okta

4.6. Password Bank

4.7. Ping Identity

4.8. Sailpoint

4.9. Symplifyed

4.10. iWelcome

5. Identity governance and administration

5.1. CA Technologies

5.2. IBM Security

5.3. Oracle

5.4. RSA (Aveksa)

6. Privileged account management (PAM)

6.1. BeyondTrust

6.2. Lieberman Software

6.3. Cyber Ark

6.4. Dell

6.5. Centrify

7. Public Certificate Authorities

7.1. Comodo

7.2. Crosscert

7.3. Geotrust

7.4. Godaddy

7.5. Symantec (Formerly VeriSign)

8. User Authentication

8.1. Behavioral Authentication

8.1.1. Behaviosec

8.1.2. BioCatch

8.1.3. Google

8.1.3.1. Trust API

8.1.4. ThreatMetrix

8.1.5. Trusona

8.2. Biometrics (biological measurements)

8.2.1. Behavioral

8.2.1.1. Typing rhythm/keystroke dynamics

8.2.1.1.1. Watchful Software

8.2.1.1.2. AuthenWare

8.2.1.2. Voice recognition

8.2.1.2.1. Agnitio

8.2.1.2.2. Nuance

8.2.2. Biological

8.2.2.1. Face recognition

8.2.2.1.1. Sensible Vision

8.2.2.2. Fingerprint

8.2.2.2.1. Digital Persona

8.3. KBA

8.3.1. It's Me Security

8.3.1.1. http://www.itsmesecurity.com/

8.4. Tokens

8.4.1. OOB authentication

8.4.1.1. SMS

8.4.1.2. Voice

8.4.1.3. Push

8.4.1.3.1. Duo Security

8.4.1.4. Email

8.4.1.5. Social media

8.4.2. OTP tokens

8.4.2.1. OTP hardware tokens

8.4.2.2. OTP software tokens for smart phones

8.4.2.2.1. EMC/RSA

8.4.2.2.2. Google

8.4.2.2.3. Symantec

8.4.2.2.4. Trusona

8.4.3. X.509 tokens

8.4.4. Other tokens

8.4.4.1. ANECT AS - ALUCID

8.5. Wide-focus vendors

8.5.1. Alladin-RD

8.5.2. CA Technologies

8.5.3. Entrust

8.5.4. HID Global

8.5.5. RSA

8.5.5.1. Adaptive Auth

8.5.6. Gemalto

8.5.7. Symantec

8.5.8. Technology Nexus

8.5.9. VASCO

9. User Privilege Management

9.1. Appsense

9.1.1. http://www.appsense.com/

9.2. Ariella

9.2.1. http://www.arellia.com/

9.3. Avectco

9.3.1. http://www.avecto.com/

9.4. BeyondTrust

9.4.1. http://www.beyondtrust.com/

9.5. Centrify

9.5.1. http://www.centrify.com/

9.6. CionSystems

9.7. CrossIdeas

9.7.1. http://www.crossideas.com/

9.8. Dell

9.8.1. http://www.quest.com/desktop-authority-management-suite/

9.9. Lieberman Software

9.9.1. http://www.liebsoft.com/

9.10. Viewfinity

9.10.1. http://www.viewfinity.com/

10. Identity Blockchain

10.1. 2Way.IO

10.2. airbitz

10.3. Block Armor

10.4. Blockstack

10.4.1. Open Source

10.5. hypr

10.6. ID.me

10.7. KYC-Chain

10.8. tradle.io

10.9. trunomi

10.10. uniquid

10.11. Uport