Akamai Identity Cloud Logo

Akamai Identity Cloud

0
Commercial
Visit Website

Akamai Identity Cloud is a SaaS-based customer identity and access management (CIAM) solution designed for high-volume consumer brands. It offers customizable user experiences for registration and authentication, integrates with existing tech tools and third-party apps, and provides security measures such as client reputation assessment and strong data encryption. The platform enables management of user accounts, security, and analytics through webhooks, reports, logs, and dashboards. It supports compliance with regulations like GDPR, CCPA, and PIPEDA by allowing users to control their personal information and providing tools for data collection, storage, and updates using industry-standard authentication protocols. The solution is scalable, capable of handling millions of identities worldwide, and offers features like single sign-on (SSO), various authentication methods, and integration with data analytics for real-time customer activity insights.

FEATURES

ALTERNATIVES

This article discusses protected accounts and groups in Active Directory, providing examples and screenshots to illustrate key concepts.

Free

Akamai Account Protector is a cybersecurity tool that prevents account abuse by detecting and mitigating fraudulent activities through user behavior analysis and real-time risk scoring.

Commercial

Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.

Free

AWS IAM Security Assessment tool for identifying violations of least privilege and generating risk-prioritized reports.

Free

Secure and manage passwords across devices with Bitwarden's open-source, encrypted password manager.

Free

A secret keeper that stores secrets in DynamoDB, encrypted at rest.

Free

AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.

Commercial

Repository documenting common techniques to bypass AppLocker with verified, unverified, and generic bypasses.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved