Partners

We have carefully selected all of our technology partners. We only deliver the best-in-class IAM solutions.

CyberArk

CyberArk is a global leader and pioneer of a new layer of IT security solutions that protects organizations from cyber attacks that have made their way inside the network perimeter to strike at the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage.

The company is trusted by the world’s leading companies – including 40 percent of the Fortune 100 and 17 of the world’s top 20 banks – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, MA. The company also has offices throughout EMEA and Asia-Pacific.

Learn more
IBM

IBM Security provides a single interface for maintaining security profiles and policies across heterogeneous systems in mainframe, distributed and desktop environments. This allows you to decrease your costs while increasing productivity and customer satisfaction. We implement several IBM solutions like:

  • Cloud Identity: IDaaS family
  • Access Management family
  • Identity Governance and Administration family
  • Privileged Account Management

With over 388,000 employees worldwide, IBM is the largest and most profitable information technology employer in the world. The company is active in over 170 countries.

Learn more
TrustBuilder

TrustBuilder Corporation is a Europan product vendor of a state-of-the-art Identity and Access Management (IAM) solution. The company brings on board almost 20 years of experience in implementing IAM solutions. Its IDHub is an innovative IAM/CIAM platform that overcomes challenges today’s Web- and API-Access Management tools face, whilst remaining user-friendly and flexible. Based in the heart of Europe, the company’s customers manage over 40 million digital user identities.

learn more
Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 4,000 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.

Learn more
Omada logo
Omada

Omada is a market leading provider of IT security solutions for identity management and access governance. Omada delivers services within identity and access governance, risk management, compliance, role-based access management, and process governance.

Omada enables organizations to achieve compliance, reduce risk exposure, and maximize efficiency – providing policies, processes, and solutions for fulfillment of governance demands.

Established in 2000, Omada has operations in Europe and North America, delivering its solution via a network of skilled partners and system integrators. Omada is trusted by hundreds of customers including many global enterprises.

Learn more
Ping Identity

The Ping Identity Platform allows enterprises and their users to securely access cloud, mobile and on-premises applications while managing identity and profile data at scale. Architects and developers have flexible options to enhance and extend their existing applications and environments with multi-factor authentication, single sign-on, access management, directory and data governance capabilities. Ping also offers technical support, training and professional services to ensure rapid implementation and zero-downtime deployments that follow best practices.

Learn more
RSA

RSA Aveksa’s leadership in Identity and Access Governance (“IAG”) will help our customers ensure that users have appropriate and secure access to applications from within the enterprise or the cloud. Maintaining compliance with regulatory guidelines is critical – whether it’s SOX, HIPAA, PCI DSS, or any of the other security regulations that may be applicable to your firm and industry. RSA Aveksa’s purpose-built architecture provides the functionality needed to efficiently meet compliance standards while concurrently delivering access to business users. Very often, access review processes are poorly documented (if at all) and often manual. Access reviews can take multiple weeks to complete using cumbersome spreadsheets, with multiple participants and infrequent violation checks. With RSA Aveksa your organization can easily automate access certification, reporting, user entitlement remediation and change validation to create an efficient and seamless review process. Access changes resulting from review processes are easily made through service desk integration or provisioning solutions like ISIM. Together with all of our trusted technology partners we can offer you a complete set of solutions. Please check our product site for more information.

Learn more