RAC/M Identity

RAC/M Identity

OKIOK Data
+
+

Related Products

  • Auth0
    907 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    531 Ratings
    Visit Website
  • Cisco Duo
    1,360 Ratings
    Visit Website
  • FusionAuth
    159 Ratings
    Visit Website
  • Uniqkey
    178 Ratings
    Visit Website
  • Veriam
    3 Ratings
    Visit Website
  • Keeper Security
    1,696 Ratings
    Visit Website
  • Kinde
    50 Ratings
    Visit Website
  • ARGOS Identity
    8 Ratings
    Visit Website
  • AgeChecker.Net
    Visit Website

About

RAC/M Identity™ is a simple, effective, IGA solution that enables organizations large and small to understand and manage the complex relationships between users and their access to physical and digital assets, whether on-premises or in the cloud. It is the cornerstone upon which to build a successful IAM program capable of taming your most daunting challenges such as lack of resources, limited budgets, strict timelines, complex technological and business landscape. RAC/M Identity™ also addresses one of the most difficult challenges faced by IAM programs, maintaining executive support. It automatically generates a composite health score that reflects the maturity and effectiveness of key IAM processes, enabling executive management to assess progress made as well as the remaining road ahead on the journey. Risk is reduced by continuously identifying and remediating risky situations such as orphaned and rogue accounts, enforcing SOD rules as well as quickly revoking unnecessary access.

About

SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies of all sizes requiring a solution to manage the relationship between users and their access to physical and digital assets

Audience

Companies searching for an end to end identity and access management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

OKIOK Data
Founded: 1973
Canada
www.okiok.com/products/identity-management-racm-identity/

Company Information

SecurEnvoy
Founded: 2003
United Kingdom
www.securenvoy.com/en-gb/identity-and-access-management-iam-platform

Alternatives

Fischer Identity

Fischer Identity

Fischer International Identity

Alternatives

RadiantOne

RadiantOne

Radiant Logic
RSA SecurID

RSA SecurID

RSA Security
Youzer

Youzer

YOUZER
IDM365

IDM365

ITMC Soft
Symantec IGA

Symantec IGA

Broadcom

Categories

Categories

Integrations

A10 Thunder ADC
Active Directory
Amazon Web Services (AWS)
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
F5 BIG-IP
FortiGate NGFW
GlobalProtect
IBM Cloud
Ivanti Connect Secure
Microsoft 365
Microsoft Outlook
Microsoft SharePoint
Omnissa Horizon 8
Oracle Cloud Infrastructure
Oracle Identity Management
Ping Identity
Salesforce

Integrations

A10 Thunder ADC
Active Directory
Amazon Web Services (AWS)
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
F5 BIG-IP
FortiGate NGFW
GlobalProtect
IBM Cloud
Ivanti Connect Secure
Microsoft 365
Microsoft Outlook
Microsoft SharePoint
Omnissa Horizon 8
Oracle Cloud Infrastructure
Oracle Identity Management
Ping Identity
Salesforce
Claim RAC/M Identity and update features and information
Claim RAC/M Identity and update features and information
Claim SecureIdentity IAM and update features and information
Claim SecureIdentity IAM and update features and information