Akamai Identity Cloud is a SaaS-based customer identity and access management (CIAM) solution designed for high-volume consumer brands. It offers customizable user experiences for registration and authentication, integrates with existing tech tools and third-party apps, and provides security measures such as client reputation assessment and strong data encryption. The platform enables management of user accounts, security, and analytics through webhooks, reports, logs, and dashboards. It supports compliance with regulations like GDPR, CCPA, and PIPEDA by allowing users to control their personal information and providing tools for data collection, storage, and updates using industry-standard authentication protocols. The solution is scalable, capable of handling millions of identities worldwide, and offers features like single sign-on (SSO), various authentication methods, and integration with data analytics for real-time customer activity insights.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
Repository documenting common techniques to bypass AppLocker with verified, unverified, and generic bypasses.
Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
A list of disposable email domains to detect or block disposable accounts
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.