Akamai Identity Cloud Logo

Akamai Identity Cloud

0
Commercial
Visit Website

Akamai Identity Cloud is a SaaS-based customer identity and access management (CIAM) solution designed for high-volume consumer brands. It offers customizable user experiences for registration and authentication, integrates with existing tech tools and third-party apps, and provides security measures such as client reputation assessment and strong data encryption. The platform enables management of user accounts, security, and analytics through webhooks, reports, logs, and dashboards. It supports compliance with regulations like GDPR, CCPA, and PIPEDA by allowing users to control their personal information and providing tools for data collection, storage, and updates using industry-standard authentication protocols. The solution is scalable, capable of handling millions of identities worldwide, and offers features like single sign-on (SSO), various authentication methods, and integration with data analytics for real-time customer activity insights.

FEATURES

ALTERNATIVES

Open-source universal secret manager for developers with seamless integration to various cloud services and vaults.

Free

Tool for associating IAM roles to Pods in Kubernetes clusters.

Free

Guidelines and best practices for securely storing passwords.

Free

AWS IAM Security Assessment tool for identifying violations of least privilege and generating risk-prioritized reports.

Free

A library for forward compatibility with PHP password functions.

Free

A platform that helps companies automate the management of their SaaS identities and applications, providing visibility, security, and compliance across the organization's SaaS ecosystem.

Commercial

CredStash is a tool for managing and securely storing credentials.

Free

Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved