Nuestra red de partners IAM para soluciones independientes
Soluciones IAM personalizadas respaldadas por una amplia gama de productos
En iC Consult, somos totalmente independientes y nos centramos al 100% en las necesidades del cliente, trabajando con más de 30 de los mejores proveedores de IAM para ofrecer soluciones que realmente prioricen sus particularidades.
30+
socios
850+
empleados
5000+
proyectos
La calidad surge de la elección
Nuestros clientes son nuestro centro de atención, y la calidad proviene de las diversas opciones que ofrecemos.
Gracias a nuestra amplia experiencia en IAM, estamos orgullosos de contar con una amplia red de socios que incluye a más de 30 proveedores líderes de software IAM. Esto nos permite ofrecer soluciones personalizadas e independientes que se adaptan perfectamente a las necesidades individuales de nuestros clientes.
Eche un vistazo a las actividades de nuestros partners y descubra cómo nuestro compromiso con la formación continua y el intercambio profesional contribuye al éxito de nuestros clientes.
Nuestras actividades dedicadas en el área de partners:
El Consejo Asesor Tecnológico ofrece una plataforma estratégica de asesoramiento interno
El contacto directo con la dirección (de producto), el desarrollo y la asistencia facilita una comunicación inmediata y eficaz
La formación interna y de proveedores proporciona las últimas tendencias del sector y actualizaciones tecnológicas.
Una comunidad conectada y el intercambio de buenas prácticas son claves para impulsar la innovación
El acceso a nuestro laboratorio y a nuestra plataforma de gestión del conocimiento proporciona herramientas y recursos prácticos
Los frecuentes círculos de expertos fomentan el diálogo y las ideas dinámicas del sector
Nuestro Centro de Excelencia refuerza las asociaciones mediante un intenso intercambio de conocimientos y garantiza la escalabilidad de los proyectos a través de una formación específica
Nuestra red de partners IAM
Partners destacados
Delinea is a leading provider of Privileged Access Management (PAM) solutions for the modern, hybrid enterprise. The Delinea Platform seamlessly extends PAM by providing authorization for all identities, controlling access to an organization’s most critical hybrid cloud infrastructure and sensitive data to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
As organizations continue their digital transformations and move to the cloud, they are faced with increasingly complex privileged access requirements for the expanded threat landscape. But the opposite of complex isn’t simple – it’s seamless. The Delinea Platform seamlessly extends Privileged Access Management (PAM) by providing authorization for all identities across the modern, hybrid enterprise. We believe every user should be treated like a privileged user and wants seamless, secure access, even as administrators want privileged access controls without excess complexity. Our solutions put privileged access at the center of cybersecurity strategies by defining the boundaries of access.
With Delinea, privileged access is more accessible.
Omada is a market leading provider of IT security solutions for identity management and access governance. Omada delivers services within identity and access governance, risk management, compliance, role-based access management, and process governance.
Omada enables organizations to achieve compliance, reduce risk exposure, and maximize efficiency – providing policies, processes, and solutions for fulfillment of governance demands.
Established in 2000, Omada has operations in Europe and North America, delivering its solution via a network of skilled partners and system integrators. Omada is trusted by hundreds of customers including many global enterprises.
Since 2004, Omada has been experiencing an average growth of 60% and has consistently received the Triple ‘A’ credit ranking. Omada has also been named IT Company of the Year 2004 by IDG Computer World and identified as an “International Growth Comet” by the prestigious Massachusetts Institute of Technology (MIT).and process governance.
It actually began well before Saviynt was founded. Back in 2001, when Sachin Nayyar decided to create Vaau, he had a vision to create an Enterprise Role Management and Identity Compliance technology that would allow companies to manage their auditing and compliance costs. Brought into many of the Fortune 100 companies, the technology quickly became the standard for IGA. Fast forward to 2009, after Vaau was acquired by Sun Microsystems, and ultimately became part of Oracle’s ubiquitous GRC product, Sachin saw the need for a major upgrade to the now 10+ year old IGA solutions still being used by corporations around the globe. Enter Saviynt. Our vision is to redefine IGA by converging traditional Identity Management with CASB and Application GRC capabilities. In doing this, Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for cloud and enterprise. One of our most sought after features is the advanced risk analytics and intelligence capabilities, able to dig down to work at the fine-grained privilege management levels.
Since our founding in 2009, Sachin has built a world class team with deep expertise in IGA and Cloud Security. We now integrate with all of the mainstream applications, platforms and infrastructure being used today, as well as custom enterprise applications. Some of the largest companies in the world trust their security with the Saviynt platform, and the analyst community is once again sounding their praises of the company that Sachin built.
Otros fabricantes con los que colaboramos
1Kosmos automates identity verification by detecting stolen and synthetic identities before new account origination. Our non-phishable, passwordless MFA solutions make logins fun and secure, protecting workers from password-based attacks and eliminating account takeover and financial fraud targeting customers.
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers are using AWS to lower costs, become more agile, and innovate faster.
The Axiomatics Orchestrated Authorization solution is an attribute-based access control (ABAC) solution designed to address enterprise application and database access challenges across any type of infrastructure – on-premises, cloud or hybrid. This is the most complete platform available for enterprise-wide roll out of ABAC, enabling enterprises to manage access based on what their corporate access policy demands. Leveraging this platform, organizations can ensure critical corporate applications, data and processes are only accessed appropriately according to policies that address what a person has access to, how much access they have, when they get access and under what conditions. These access decisions are made in real-time, reflecting real-world enterprise situations including a workforce working from anywhere, an ever-increasing number of global data privacy regulations, and sophisticated bad actors.
cidaas provides an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With cidaas, companies create unique user identification and maximum security across all channels. Based on the standards OAuth2.0, OpenID, SAML 2.0 and its "Everything is an API" architecture, cidaas can be seamlessly integrated into any software landscape and scales to any company size.
With the cidaas ID validator, we offer an innovative service for simple and automated verification of ID documents within a few minutes. It enables highly secure and efficient online identity verification with the help of artificial intelligence & machine learning. Fully automated video-based legitimation takes place using an AutoIdent process, without interaction with another person. The cidaas ID validator not only impresses with its user-friendliness and maximum security but is also GDPR and eIDAS-compliant.
Widas ID GmbH presents cidaas as the premier European Cloud Identity & Access Management (CIAM & IAM) solution, along with the cidaas ID Validator—an innovative, fully automated solution for digital identity verification. The Widas Group has been offering "Software made in Germany" since 1997 and is proud to have developed cidaas, a comprehensive identity platform that is developed and hosted in Germany.
Clear Skye IGA is an identity security solution built on the ServiceNow Platform. It provides identity governance through access request, access certification, employee lifecycle automation, and workflow management. With identity data on the Now Platform, Clear Skye plugs directly into your business processes, provides deep identity control and insights, and builds the bridge between the business and IT.
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches.
EmpowerID is the award-winning all-in-one Identity Management and Cloud Security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external Cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready-to-use IAM functionality. In-depth out-of-the-box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. The latest advances in machine learning and role mining analytics assist organizations to uncover the optimal role model to minimize administrative workloads and an organization’s overall risk profile. A visual workflow process model and design studio with over 1,000 ready-to-use IAM workflows ensures that security processes adapt to match the unique needs of the organization and their industry.
Eviden designs the scope composed of Atos’ digital, cloud, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 53 countries. By uniting unique high-end technologies across the full digital continuum with 57,000 world-class talents, Eviden expands the possibilities of technologies for enterprises and public authorities, helping them to build their digital future. Eviden is an Atos Group business with an annual revenue of c. € 5 billion.
Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments.
IBM is a leading cloud platform and cognitive solutions company. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 employees serving clients in 170 countries. With Watson, the AI platform for business, powered by data, we are building industry-based solutions to real-world problems. For more than seven decades, IBM Research has defined the future of information technology with more than 3,000 researchers in 12 labs located across six continents.
IndyKite is building a new paradigm of customer centric, digital identity solutions, with a connected data core.
We want to help our clients to move beyond traditional IAM and driving business value across all their products and services.
With products that securely manage human, IoT, and machine identity, our products leverage machine learning to deliver context-aware authorization, knowledge driven decisions, trusted data sharing and risk analytics.
Built on a knowledge graph data model, IndyKite enables developers with flexible APIs through a growing open-source ecosystem.
Kong provides the foundation that enables any company to become an API-first company — speeding up time to market, creating new business opportunities, and delivering superior products and services.
Built on the world’s most adopted API gateway, Kong’s unified cloud API platform delivers fast, reliable, secure digital experiences. With Kong, organizations can increase developer productivity, security, and performance at scale with a single easy-to-use platform for API management, service mesh, and ingress controller.
Empowering IAM through Identity Orchestration
By combining powerful IAM features with a modern visual identity orchestration platform, Monokee adds value to your identities and their journeys.
With Monokee, you gain a comprehensive solution that empowers you to efficiently manage user identities, streamline access controls, and ensure compliance with ease.
Additionally, Monokee’s integration with decentralized identity technologies provides a future-proof solution that aligns with the ever-evolving landscape of digital identities.
Nevis develops security solutions for the digital world of tomorrow. Our portfolio includes passwordless logins, which are intuitive to use and offer optimal protection of user data. As a specialist in authentication, Nevis has more than twenty years of experience: until early 2020 as a part of AdNovum Informatik AG, and since then as an independent spin-off company. Nevis is the market leader for Identity and Access Management in Switzerland, and it protects over 80 percent of all e-banking transactions. Government authorities and leading service providers and industrial companies across the globe rely on Nevis solutions. In addition to its headquarters in Zurich, Nevis operates offices in Germany, the United Kingdom, and Hungary.
WORLD-CLASS IN DIGITAL IDENTITIES, ROLES, AND ENTITLEMENTS
Our team of enthusiastic security specialists, consultants, and developers commit every day to improve our customers’ identity and access performance. Our software digitalizes and simplifies time-consuming IT processes and gives your employees time for other important tasks.
We are an innovative security software vendor with university roots. The very core of our work deals with profound methodologies, excellent usability, and solutions for bringing together technology and business needs.
All our products are designed and developed in Germany. Our high-class consulting and support services are operated from Germany. Our customers include organizations in financial services, insurance, high technology industries, and retail, amongst others.
OpenText can help you tackle the most complex digital transformation programs with confidence. With the world’s most complete and integrated Information Management platform, we empower our customers to organize, integrate and protect data and content as it flows through business processes inside and outside their organization.
We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’ data.
Oracle Cloud Infrastructure offers higher performance, security, and cost savings. It is designed so businesses can move workloads easily from on-premises systems to the cloud, and between cloud and on-premises and other clouds. Oracle Cloud applications provide business leaders with modern applications that help them innovate, attain sustainable growth, and become more resilient.
The work we do is not only transforming the world of business--it's helping defend governments, and advance scientific and medical research. From nonprofits to companies of all sizes, millions of people use our tools to streamline supply chains, make HR more human, quickly pivot to a new financial plan, and connect data and people around the world.
At work, we embrace diversity, encourage personal and professional growth, and celebrate a global team of passionate people developing innovative technologies that help people and companies tackle real-world problems head-on.
PlainID is the Authorization Company. Our cutting edge solutions enable organizations to grow their business faster whether it be via our Policy Manager or Partner Manager product lines.
PlainID was founded in 2014 by a team of experienced security technologists determined to put an end to the challenges that businesses face when scaling up their IAM capabilities. The solution led to a completely new design that reduces all enterprise authorizations to a single point of view – making Authorization plain and simple for business owners to manage and control.
Radiant Logic, the identity data experts, helps organizations turn identity data into a strategic asset that drives automated governance, enhanced security, and operational efficiency.
Our RadiantOne Identity Data Platform removes complexity as a roadblock to identity-first strategies by creating an authoritative data source for real-time, context-aware controls. We provide visibility and actionable insights to intelligently detect and remediate risk using AI/ML-powered identity analytics.
With RadiantOne, organizations are able to tap into the wealth of information across the infrastructure, combining context and analytics to deploy governance that works for the most advanced use cases.
Resist attacks by reducing excessive access. Saporo improves your cyber resistance by prioritizing and reducing user and system access risks.
By anticipating how attackers can use your configuration weaknesses and user access permissions, Saporo provides you with the most effective actions you need to perform to improve your cyber resistance.
Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise™ technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner “Cool Vendor” in 2016, our 4th generation platform is now serving mid-sized to Fortune 50 customers around the globe.
As cybersecurity leaders and Active Directory (AD) experts, we know that identity-first security is the key to operational resilience. For more than 90% of today’s enterprise organizations, if AD isn’t secure, nothing is. Many of the world’s leading businesses trust Semperis to help them protect AD and Azure AD from escalating cyber threats. Nothing is off-limits to today’s cyberattackers, including emergency services, hospitals and healthcare providers, schools, and financial institutions. Whether your business is building businesses, saving lives, or serving citizens, we help you operate with confidence by protecting your critical identity infrastructure.
PAM should be an easy and innovative way to first adopt a culture of identity to prevent cyber attacks, to comply with global norms, regulations, frameworks, standards, and certifications, all while reducing stress and increasing confidence. A PAM solution can help you protect your data, comply with regulations, and give you peace of mind knowing that your systems are secure.
We aim to ensure companies' sovereignty over privileged actions and information. To achieve this, we act against data theft and traceability of administrators' actions on networks, servers, databases, and a myriad of devices. Additionally, we seek compliance with audit requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.
senhasegura is a leading PAM provider that offers a comprehensive solution that meets the needs of businesses of all sizes. Our solution is:
- Highly adaptable: senhasegura can be easily configured to meet the specific needs of your organization.
- Transparent: senhasegura provides comprehensive monitoring and reporting capabilities so you can easily track all access and activity.
- Quick to deploy: senhasegura has the shortest implementation time in the industry, so you can start protecting your data right away. Digital sovereignty is a fundamental right of citizens, institutions, and society. That's why we work every day.
Silverfort is the only Unified Identity Protection Platform that extends identity protection to any sensitive resource, including ones that couldn’t be protected before, without having to modify them. That includes legacy systems, command-line interfaces, IT/OT infrastructure, service accounts (non-human identities) and many more. Silverfort delivers secure authentication and access policies across the entire hybrid identity infrastructure – both legacy and modern – from a single unified platform, and stops identity-based threats everywhere. Silverfort is headquartered in Tel Aviv, Israel, and was founded in 2016.
Styra enables enterprises to define, enforce and monitor policy across their cloud-native environments. With a combination of open source (Open Policy Agent) and commercial solutions (Styra Load and Styra Declarative Authorization Service), Styra provides security, operations and compliance guardrails to protect applications, as well as the infrastructure they run on. Styra policy-as-code solutions lets developers, DevOps and security teams mitigate risks, reduce human error and accelerate application development.
The tenfold Software GmbH, based in Vienna, is focused on helping companies manage the growing demands of access management more efficiently and easily. With our innovative software solution "tenfold," we have successfully revolutionized the management of IT users and IT permissions—never before has it been so easy to automatically control all important processes in the IT user lifecycle while simultaneously knowing, at any given time, who across the company currently has which permissions. Together with our partners, we support clients from medium-sized and large enterprises across all conceivable industries.
Transmit Security gives businesses the modern tools they need to build secure, trusted and end-to-end digital identity journeys to innovate and grow. CX-focused, cybersecurity-conscious leaders rely on Transmit Security’s Platform to provide their customers with smooth experiences protected from fraud across all channels and devices. Transmit Security serves many of the world’s largest banks, insurers, retailers, and other leading brands, collectively responsible for more than $3.1 trillion in annual commerce. Transmit Security was co-founded by serial entrepreneurs and investors, Mickey Boodaei and Rakesh Loonkar in 2014 with the aim of changing the security identity landscape. In 2020, Deloitte recognized Transmit Security as the 5th fastest growing company in North America. In March, we were recognized by Fast Company as one of the 10 Most Innovative Security Companies of 2022.