Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA
Identity and access

2022 SC Awards Finalists: Best Identity Management Solution

SC StaffMay 16, 2022

As a core pillar of zero trust, identity and access strategies protect recognize the need to track and protect the range of identities across the enterprise – human or machine – to detect and prevent breaches.

Products recognized in this category address the identity management life cycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

Click here to see our full list of 2022 SC Award finalists.

SC Staff
SC Staff

The Top 5 | Best Identity Management Solution

CyberArk Identity Security Platform enforces least privilege and enables secure access across any device, anywhere, at just the right time.
Identity Management Solution
CyberArk Identity Security Platform

CyberArk

CyberArk Identity Security Platform enforces least privilege and enables secure access across any device, anywhere, at just the right time. Built on a foundation of privileged access management and powered by AI-based behavior and risk analytics, the platform helps organizations secure access to critical business data and infrastructure, protect a distributed workforce, and accelerate business in the cloud.

Identity Management Solution
Deduce Identity Network

Deduce

The Deduce Identity Network is a consortium of over 150,000-plus participating websites and apps with the objective of sourcing the maximum amount of real-time user activity intelligence for a given profile as they log-in, transact and create accounts online. With over 450M unique identity profiles that collectively generate in excess of 1.4B daily interactions, Deduce sees the majority of the U.S. population transact in real-time, several times a week, based on four principal threat vectors: device, network, geography, and activity.

Identity Management Solution
Semperis Directory Services Protector

Semperis

Directory Service Protector (DSP) enables rapid response, continuously monitors Active Directory for indicators of exposure, and detects advanced attacks. DSP translates unstructured AD and Azure AD change data into human-readable format; enables drilldown to any point in time to isolate compromised accounts and prevent future attacks; and uncovers 100-plus vulnerabilities and risky configurations in AD and Azure AD before attackers.

Identity Management Solution
Unified Identity Security Platform

One Identity

The Unified Identity Security Platform integrates four traditionally distinct product areas into a single solution, ensuring that data silos are unified, and people, applications and data are all aligned as one. The end result is a reduced attack surface and improved cybersecurity resilience.

Identity Management Solution
Xage Fabric

Xage Security

Xage Fabric is a zero trust solution that provides an overlay mesh to protect critical infrastructure by imposing granular control over all digital interactions. The Fabric ensures that each operational element — even those with no built-in identity of their own — is assigned an identity that determines who has access to it, and what the element may access itself. The Fabric not only blocks cyberattacks, but also isolates malware, siloing it and rendering it unable to pass between systems to ensure the operation can continue functioning undisturbed.

Related Events

  • Cybercast
    Passwordless security: Where things stand, and What’s next?

    Tue Apr 18Tue Apr 18

  • eSummit
    IAM: Tales from the cutting edge, for the watch-and-learn crowd

    Wed Apr 12 - Thu Apr 13

  • Cybercast
    Reducing risk with user access review automation

    Wed Apr 5Wed Apr 5

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.