Try our new research platform with insights from 80,000+ expert users

What are your best practices for Identity and Access Management (IAM) in the Cloud?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 5
  • 48
PeerSpot user

6 Answers

Last answered May 20, 2022
LN
IDM Engineer at a tech services company with 51-200 employees
Real User
Feb 23, 2022
Search for a product comparison in Identity Management (IM)
Pramod Bhaskar - PeerSpot reviewer
Chief Technology Officer at ILANTUS Technologies
Vendor
May 20, 2022
rtechenthusiast85 - PeerSpot reviewer
Search Engine Optimization Specialist at LoginRadius
Vendor
May 19, 2022
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ModeratorTop 5
Feb 27, 2022
KZ
Senior Consultant at Golden Ideas
Consultant
Feb 24, 2022
JohnDoe113 - PeerSpot reviewer
- at a tech services company with 51-200 employees
Real User
Mar 9, 2022
Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM). Updated: January 2026.
881,082 professionals have used our research since 2012.
Cloud Resource Access Management
Cloud Resource Access Management offers comprehensive solutions for managing and securing cloud environments, ensuring efficient access control.Users appreciate solutions that facilitate streamlined access management, improving both security and operational productivity. These platforms allow businesses to define and enforce access policies, audit access logs, and ensure compliance with regulatory requirements. By leveraging these tools, companies can mitigate the risk of unauthorized access...
Download Cloud Resource Access Management ReportRead more

Related Q&As