Identity and Access Management (IAM) - by Lawrence Pingree

시작하기. 무료입니다
또는 회원 가입 e메일 주소
Identity and Access Management (IAM) - by Lawrence Pingree 저자: Mind Map: Identity and Access Management (IAM) - by Lawrence Pingree

1. Identity Blockchain

1.1. 2Way.IO

1.2. airbitz

1.3. Block Armor

1.4. Blockstack

1.4.1. Open Source

1.5. hypr

1.6. ID.me

1.7. KYC-Chain

1.8. tradle.io

1.9. trunomi

1.10. uniquid

1.11. Uport

2. Identity Governance & Visibility (IGA & IVIP)

2.1. CA Technologies

2.2. Crowdstrike

2.3. Evolveum

2.4. Hydden

2.5. IBM Security

2.6. Lumos

2.7. Omada

2.8. Oracle

2.9. P0 Security

2.10. RSA (Aveksa)

2.11. SailPoint

2.12. Saviynt

2.13. Silverfort

2.14. SecurEnds

2.15. Veza

2.16. IBM

3. Privileged Access Management (PAM)

3.1. Apono

3.2. BeyondTrust

3.3. Broadcom

3.4. CyberArk

3.5. Delinea

3.6. Fudo

3.7. Heimdal

3.8. Hydden

3.9. Jumpcloud

3.10. Keeper Security

3.11. ManageEngine

3.12. Netwrix

3.13. One Identity

3.14. SSH Communications Security

3.15. StrongDM

3.16. Sectona

3.17. WALLIX

4. Public Certificate Authorities

4.1. Amazon Trust Services

4.2. Actalis

4.3. Crosscert

4.4. Certum

4.5. Digicert

4.6. Entrust

4.7. Geotrust

4.8. GlobalSign

4.9. Godaddy

4.10. Let's Encrypt

4.11. Sectigo

5. User Authentication

5.1. Behavioral Authentication

5.1.1. Acceptto

5.1.2. Behaviosec

5.1.3. BioCatch

5.1.4. CallSign

5.1.5. Google

5.1.5.1. Trust API

5.1.6. ThreatMetrix

5.1.7. Trusona

5.2. Biometrics (biological measurements)

5.2.1. Behavioral

5.2.1.1. Typing rhythm/keystroke dynamics

5.2.1.1.1. Watchful Software

5.2.1.1.2. AuthenWare

5.2.1.1.3. CallSign

5.2.1.2. Voice recognition

5.2.1.2.1. Agnitio

5.2.1.2.2. Nuance

5.2.2. Biological

5.2.2.1. Face recognition

5.2.2.1.1. Sensible Vision

5.2.2.2. Fingerprint

5.2.2.2.1. Digital Persona

5.3. Tokens

5.3.1. OOB authentication

5.3.1.1. SMS

5.3.1.1.1. CallSign

5.3.1.2. Voice

5.3.1.2.1. CallSign

5.3.1.3. Push

5.3.1.3.1. Duo Security

5.3.1.4. Email

5.3.1.5. Social media

5.3.1.6. Passwordless

5.3.1.6.1. CallSign

5.3.2. OTP tokens

5.3.2.1. OTP hardware tokens

5.3.2.2. OTP software tokens for smart phones

5.3.2.2.1. EMC/RSA

5.3.2.2.2. Google

5.3.2.2.3. Symantec

5.3.2.2.4. Trusona

5.3.2.2.5. CallSign

5.3.3. X.509 tokens

5.3.4. Other tokens

5.3.4.1. ANECT AS - ALUCID

5.4. Wide-focus vendors

5.4.1. Alladin-RD

5.4.2. CA Technologies

5.4.3. CallSign

5.4.4. Duo Security

5.4.5. Entrust

5.4.6. Gemalto

5.4.7. HID Global

5.4.8. Okta

5.4.9. Ping

5.4.10. RSA

5.4.10.1. Adaptive Auth

5.4.11. Symantec

5.4.12. Technology Nexus

5.4.13. VASCO

5.5. Enterprise Password Managers

5.5.1. 1Password

5.5.2. Avatier

5.5.3. BeyondTrust

5.5.4. CyberArk

5.5.5. DashLane

5.5.6. Evolve IP

5.5.7. Kaseya

5.5.8. Keeper Security

5.5.9. LastPass

5.5.10. OneLogin

5.5.11. PassWork

5.5.12. RoboForm

5.5.13. SolarWinds

5.5.14. TeamsID

5.5.15. Thycotic

5.5.16. Trend Micro

5.5.17. Zoho

6. Identity Threat Detection and Response (ITDR)

6.1. Acalvio

6.2. BeyondTrust

6.3. Crowdstrike

6.4. Commvault

6.5. Cisco

6.6. CyberArk

6.7. Datto

6.8. Delinea

6.9. Druva

6.10. Huntress

6.11. Hydden

6.12. Microsoft

6.13. Palo Alto Networks

6.14. Proofpoint

6.15. Quest

6.16. SailPoint

6.17. Semperis

6.18. SentinelOne

6.19. Silverfort

6.20. Sophos

6.21. Varonis

6.22. Veeam

7. Identity and Access Management (IAM)

7.1. Centrify

7.2. CyberArk

7.3. ForgeRock

7.4. IBM (Formerly Lighthouse Security)

7.5. Identity Automation

7.6. Intel

7.7. Microsoft Entra ID

7.8. Okta

7.9. Password Bank

7.10. Ping Identity

7.11. Saviynt

7.12. Sailpoint

7.13. Thales

7.14. One Identity

8. Non-Human Identity (NHI), Workload IAM, Agentic & Secrets Management

8.1. Amazon AWS

8.2. Aembit

8.3. Astrix Security

8.4. AppViewX

8.5. Akeyless

8.6. Clutch Security

8.7. CyberArk

8.8. Doppler

8.9. Entro Security

8.10. GitGuardian

8.11. HashiCorp Vault

8.12. Hydden

8.13. Hush Security

8.14. Infisical

8.15. Keyfactor

8.16. Microsoft Entra

8.17. Oasis Security

8.18. Okta

8.19. Token Security

9. Cloud Infrastructure Entitlement Management

9.1. Authomize

9.2. Britive

9.3. CyberArk

9.4. Ermetic

9.5. Horangi Cyber Security

9.6. Microsoft

9.7. Obsidian

9.8. Palo Alto Networks

9.9. SailPoint

9.10. Saviynt

9.11. SentinelOne

9.12. Sonrai Security

9.13. Zscaler

10. Core Identity Providers (IdP), SSO & Passwordless

10.1. Beyond Identity

10.2. Cisco Duo

10.3. Okta

10.4. ForgeRock

10.5. Microsoft Entra ID

10.6. Ping Identity

10.7. RSA

10.8. JumpCloud

10.9. Yubico

11. Identity Security Posture Management (ISMP)

11.1. Axiad

11.2. Cisco

11.3. CrowdStrike

11.4. AWS

11.5. Auth0

11.6. 1Kosmos

11.7. Beyond Identity