Try our new research platform with insights from 80,000+ expert users

What are your best practices for Identity and Access Management (IAM) in the Cloud?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 4
  • 66
PeerSpot user

6 Answers

Last answered May 20, 2022
LN
IDM Engineer at a tech services company with 51-200 employees
Real User
Feb 23, 2022
Search for a product comparison in Identity Management (IM)
Pramod Bhaskar - PeerSpot reviewer
Chief Technology Officer at ILANTUS Technologies
Vendor
May 20, 2022
rtechenthusiast85 - PeerSpot reviewer
Search Engine Optimization Specialist at LoginRadius
Vendor
May 19, 2022
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ModeratorTop 5
Feb 27, 2022
KZ
Senior Consultant at Golden Ideas
Consultant
Feb 24, 2022
JohnDoe113 - PeerSpot reviewer
- at a tech services company with 51-200 employees
Real User
Mar 9, 2022
Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM). Updated: February 2026.
884,797 professionals have used our research since 2012.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers offer security solutions for cloud environments by providing visibility and control over data and applications. They address security threats, compliance requirements, and data management concerns, making them a critical component in the cloud security landscape.CASBs play a key role in enhancing security for cloud service adoption. They bridge the gap between enterprise IT infrastructure and cloud services, granting actionable insights and enforcing security...
Download Cloud Access Security Brokers (CASB) ReportRead more

Related Q&As