Akamai Identity Cloud Logo

Akamai Identity Cloud

0
Commercial
Visit Website

Akamai Identity Cloud is a SaaS-based customer identity and access management (CIAM) solution designed for high-volume consumer brands. It offers customizable user experiences for registration and authentication, integrates with existing tech tools and third-party apps, and provides security measures such as client reputation assessment and strong data encryption. The platform enables management of user accounts, security, and analytics through webhooks, reports, logs, and dashboards. It supports compliance with regulations like GDPR, CCPA, and PIPEDA by allowing users to control their personal information and providing tools for data collection, storage, and updates using industry-standard authentication protocols. The solution is scalable, capable of handling millions of identities worldwide, and offers features like single sign-on (SSO), various authentication methods, and integration with data analytics for real-time customer activity insights.

FEATURES

ALTERNATIVES

CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.

Free

Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.

Free

Secure and manage passwords across devices with Bitwarden's open-source, encrypted password manager.

Free

Redirects EC2 metadata API traffic to a container that retrieves temporary AWS credentials and proxies other calls to the EC2 metadata API.

Free

AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.

Commercial

Provision, manage, and renew SSL/TLS certificates for your AWS resources with AWS Certificate Manager.

Free

An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.

Free

DumpsterDiver is a tool for analyzing big volumes of data to find hardcoded secrets like keys and passwords.

Free