Our IAM Partner Network for Independent Solutions

Customized IAM Solutions Supported by a Wide Range of Partner Products

At iC Consult, we are committed to 100% vendor independence and 100% customer focus, working with more than 30 best-in-class IAM vendors to deliver solutions that truly prioritize your needs.

30+

Partners

800+

Consultants

3000+

Projects

Quality arises from choices


Our customers are our focus, and quality comes from the diverse options we offer.

With our extensive expertise in IAM, we are proud to have a broad partner network that includes over 30 leading IAM software vendors. This enables us to offer customized, vendor-independent solutions that are perfectly suited to our customers‘ individual needs.

Take a look at our partner activities and learn how our commitment to continuous education and professional exchange contributes to our customers‘ success.

Our IAM Partner Network

Featured Partners
close

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most.

With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including:

More than 50% of the Fortune 500

More than 35% of the Global 2000

CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands and Turkey.

close

Delinea is a leading provider of Privileged Access Management (PAM) solutions for the modern, hybrid enterprise. The Delinea Platform seamlessly extends PAM by providing authorization for all identities, controlling access to an organization’s most critical hybrid cloud infrastructure and sensitive data to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.

As organizations continue their digital transformations and move to the cloud, they are faced with increasingly complex privileged access requirements for the expanded threat landscape. But the opposite of complex isn’t simple – it’s seamless. The Delinea Platform seamlessly extends Privileged Access Management (PAM) by providing authorization for all identities across the modern, hybrid enterprise. We believe every user should be treated like a privileged user and wants seamless, secure access, even as administrators want privileged access controls without excess complexity. Our solutions put privileged access at the center of cybersecurity strategies by defining the boundaries of access.

With Delinea, privileged access is more accessible.

close

ForgeRock®, the leader in digital identity, delivers modern and comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world. Using ForgeRock, more than a thousand global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data – consumable in any cloud or hybrid environment. The company is public, and headquartered in San Francisco, California, with offices around the world. For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media.

close

Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today. Our culture doesn’t just encourage curiosity; it embraces it. Each day we make progress together by showing up as our authentic selves. We show up with a learn-it-all mentality. We show up cheering on others, knowing their success doesn't diminish our own. We show up every day open to learning our own biases, changing our behavior, and inviting in differences. Because impact matters.

Microsoft operates in 190 countries and is made up of more than 220,000 passionate employees worldwide.

close

Okta is a secure identity cloud that links all your apps, logins and devices into a unified digital fabric. With Okta, you’re up and running on day one, with every app and program you use to work, instantly available. Whether you’re at your desktop or on the go, Okta seamlessly connects you to everything you need.

close

Omada is a market leading provider of IT security solutions for identity management and access governance. Omada delivers services within identity and access governance, risk management, compliance, role-based access management, and process governance.

Omada enables organizations to achieve compliance, reduce risk exposure, and maximize efficiency – providing policies, processes, and solutions for fulfillment of governance demands.

Established in 2000, Omada has operations in Europe and North America, delivering its solution via a network of skilled partners and system integrators. Omada is trusted by hundreds of customers including many global enterprises.

Since 2004, Omada has been experiencing an average growth of 60% and has consistently received the Triple ‘A’ credit ranking. Omada has also been named IT Company of the Year 2004 by IDG Computer World and identified as an “International Growth Comet” by the prestigious Massachusetts Institute of Technology (MIT).and process governance.

close

You’ve got a job to do. And that job involves helping your organization achieve its mission and deliver on its promises securely and efficiently. At One Identity, our job — our mission — is to help you succeed in yours. That’s why we offer a comprehensive family of identity and access management (IAM) solutions designed to solve today’s challenges, and address tomorrow’s as they arise. We help you get identity and access management right.

So how do we do that?

We believe that security is much more than the practice of denial and restriction. That’s why One Identity’s design and integration philosophy is that our solutions must add agility and efficiency to an organization – regardless of size or market – as well as secure its digital assets.

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation. Let us help you get IAM right.

Please accept statistics, marketing cookies to watch this video.

close

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That's digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This can be accomplished through a simple drag-and-drop canvas. That's why more than half of the Fortune 100 choose Ping Identity to protect digital interactions for their users while making experiences frictionless. Learn more at www.pingidentity.com.

close

Focused on identity. Driven by integrity.

We believe enterprise security starts and ends with identities. By harnessing the power of AI and machine learning, SailPoint automates and streamlines the complexity of delivering the right access to the right identities and technology resources at the right time. Delivered at the scale our enterprise customers demand.

We are wholly focused on advancing technology to meet the fast-evolving needs of enterprises worldwide, empowering them to build an enterprise security foundation grounded in identity security.

close

It actually began well before Saviynt was founded. Back in 2001, when Sachin Nayyar decided to create Vaau, he had a vision to create an Enterprise Role Management and Identity Compliance technology that would allow companies to manage their auditing and compliance costs. Brought into many of the Fortune 100 companies, the technology quickly became the standard for IGA. Fast forward to 2009, after Vaau was acquired by Sun Microsystems, and ultimately became part of Oracle’s ubiquitous GRC product, Sachin saw the need for a major upgrade to the now 10+ year old IGA solutions still being used by corporations around the globe. Enter Saviynt. Our vision is to redefine IGA by converging traditional Identity Management with CASB and Application GRC capabilities. In doing this, Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for cloud and enterprise. One of our most sought after features is the advanced risk analytics and intelligence capabilities, able to dig down to work at the fine-grained privilege management levels.

Since our founding in 2009, Sachin has built a world class team with deep expertise in IGA and Cloud Security. We now integrate with all of the mainstream applications, platforms and infrastructure being used today, as well as custom enterprise applications. Some of the largest companies in the world trust their security with the Saviynt platform, and the analyst community is once again sounding their praises of the company that Sachin built.

Other Vendors We Partner Up With
close

1Kosmos automates identity verification by detecting stolen and synthetic identities before new account origination. Our non-phishable, passwordless MFA solutions make logins fun and secure, protecting workers from password-based attacks and eliminating account takeover and financial fraud targeting customers.

close

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers are using AWS to lower costs, become more agile, and innovate faster.

close

Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable, and regulated digital assets – but only to authorized users and in the right context.

close

cidaas provides an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With cidaas, companies create unique user identification and maximum security across all channels. Based on the standards OAuth2.0, OpenID, SAML 2.0 and its "Everything is an API" architecture, cidaas can be seamlessly integrated into any software landscape and scales to any company size.

With the cidaas ID validator, we offer an innovative service for simple and automated verification of ID documents within a few minutes. It enables highly secure and efficient online identity verification with the help of artificial intelligence & machine learning. Fully automated video-based legitimation takes place using an AutoIdent process, without interaction with another person. The cidaas ID validator not only impresses with its user-friendliness and maximum security but is also GDPR and eIDAS-compliant.

Widas ID GmbH presents cidaas as the premier European Cloud Identity & Access Management (CIAM & IAM) solution, along with the cidaas ID Validator—an innovative, fully automated solution for digital identity verification. The Widas Group has been offering "Software made in Germany" since 1997 and is proud to have developed cidaas, a comprehensive identity platform that is developed and hosted in Germany.

close

Clear Skye IGA is an identity security solution built on the ServiceNow Platform. It provides identity governance through access request, access certification, employee lifecycle automation, and workflow management. With identity data on the Now Platform, Clear Skye plugs directly into your business processes, provides deep identity control and insights, and builds the bridge between the business and IT.

close

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

close

EmpowerID is the award-winning all-in-one Identity Management and Cloud Security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external Cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready-to-use IAM functionality. In-depth out-of-the-box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. The latest advances in machine learning and role mining analytics assist organizations to uncover the optimal role model to minimize administrative workloads and an organization’s overall risk profile. A visual workflow process model and design studio with over 1,000 ready-to-use IAM workflows ensures that security processes adapt to match the unique needs of the organization and their industry.

close

Eviden designs the scope composed of Atos’ digital, cloud, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 53 countries. By uniting unique high-end technologies across the full digital continuum with 57,000 world-class talents, Eviden expands the possibilities of technologies for enterprises and public authorities, helping them to build their digital future. Eviden is an Atos Group business with an annual revenue of c. € 5 billion.

close

Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

close

HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments.

close

IBM is a leading cloud platform and cognitive solutions company. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 employees serving clients in 170 countries. With Watson, the AI platform for business, powered by data, we are building industry-based solutions to real-world problems. For more than seven decades, IBM Research has defined the future of information technology with more than 3,000 researchers in 12 labs located across six continents.

close

IndyKite is building a new paradigm of customer centric, digital identity solutions, with a connected data core.

We want to help our clients to move beyond traditional IAM and driving business value across all their products and services.

With products that securely manage human, IoT, and machine identity, our products leverage machine learning to deliver context-aware authorization, knowledge driven decisions, trusted data sharing and risk analytics.

Built on a knowledge graph data model, IndyKite enables developers with flexible APIs through a growing open-source ecosystem.

close

Kong provides the foundation that enables any company to become an API-first company — speeding up time to market, creating new business opportunities, and delivering superior products and services.

Built on the world’s most adopted API gateway, Kong’s unified cloud API platform delivers fast, reliable, secure digital experiences. With Kong, organizations can increase developer productivity, security, and performance at scale with a single easy-to-use platform for API management, service mesh, and ingress controller.

close

Empowering IAM through Identity Orchestration

By combining powerful IAM features with a modern visual identity orchestration platform, Monokee adds value to your identities and their journeys.

With Monokee, you gain a comprehensive solution that empowers you to efficiently manage user identities, streamline access controls, and ensure compliance with ease.

Additionally, Monokee’s integration with decentralized identity technologies provides a future-proof solution that aligns with the ever-evolving landscape of digital identities.

close

Nevis develops security solutions for the digital world of tomorrow. Our portfolio includes passwordless logins, which are intuitive to use and offer optimal protection of user data. As a specialist in authentication, Nevis has more than twenty years of experience: until early 2020 as a part of AdNovum Informatik AG, and since then as an independent spin-off company. Nevis is the market leader for Identity and Access Management in Switzerland, and it protects over 80 percent of all e-banking transactions. Government authorities and leading service providers and industrial companies across the globe rely on Nevis solutions. In addition to its headquarters in Zurich, Nevis operates offices in Germany, the United Kingdom, and Hungary.

close

WORLD-CLASS IN DIGITAL IDENTITIES, ROLES, AND ENTITLEMENTS

Our team of enthusiastic security specialists, consultants, and developers commit every day to improve our customers’ identity and access performance. Our software digitalizes and simplifies time-consuming IT processes and gives your employees time for other important tasks.

We are an innovative security software vendor with university roots. The very core of our work deals with profound methodologies, excellent usability, and solutions for bringing together technology and business needs.

All our products are designed and developed in Germany. Our high-class consulting and support services are operated from Germany. Our customers include organizations in financial services, insurance, high technology industries, and retail, amongst others.

close

OpenText can help you tackle the most complex digital transformation programs with confidence. With the world’s most complete and integrated Information Management platform, we empower our customers to organize, integrate and protect data and content as it flows through business processes inside and outside their organization.

close

We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’ data.

Oracle Cloud Infrastructure offers higher performance, security, and cost savings. It is designed so businesses can move workloads easily from on-premises systems to the cloud, and between cloud and on-premises and other clouds. Oracle Cloud applications provide business leaders with modern applications that help them innovate, attain sustainable growth, and become more resilient.

The work we do is not only transforming the world of business--it's helping defend governments, and advance scientific and medical research. From nonprofits to companies of all sizes, millions of people use our tools to streamline supply chains, make HR more human, quickly pivot to a new financial plan, and connect data and people around the world.

At work, we embrace diversity, encourage personal and professional growth, and celebrate a global team of passionate people developing innovative technologies that help people and companies tackle real-world problems head-on.

close

PlainID is the Authorization Company. Our cutting edge solutions enable organizations to grow their business faster whether it be via our Policy Manager or Partner Manager product lines.

PlainID was founded in 2014 by a team of experienced security technologists determined to put an end to the challenges that businesses face when scaling up their IAM capabilities. The solution led to a completely new design that reduces all enterprise authorizations to a single point of view – making Authorization plain and simple for business owners to manage and control.

Please accept statistics, marketing cookies to watch this video.

close

Radiant Logic, the identity data experts, helps organizations turn identity data into a strategic asset that drives automated governance, enhanced security, and operational efficiency.

Our RadiantOne Identity Data Platform removes complexity as a roadblock to identity-first strategies by creating an authoritative data source for real-time, context-aware controls. We provide visibility and actionable insights to intelligently detect and remediate risk using AI/ML-powered identity analytics.

With RadiantOne, organizations are able to tap into the wealth of information across the infrastructure, combining context and analytics to deploy governance that works for the most advanced use cases.

close

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise™ technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner “Cool Vendor” in 2016, our 4th generation platform is now serving mid-sized to Fortune 50 customers around the globe.

close

PAM should be an easy and innovative way to first adopt a culture of identity to prevent cyber attacks, to comply with global norms, regulations, frameworks, standards, and certifications, all while reducing stress and increasing confidence. A PAM solution can help you protect your data, comply with regulations, and give you peace of mind knowing that your systems are secure.

We aim to ensure companies' sovereignty over privileged actions and information. To achieve this, we act against data theft and traceability of administrators' actions on networks, servers, databases, and a myriad of devices. Additionally, we seek compliance with audit requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

senhasegura is a leading PAM provider that offers a comprehensive solution that meets the needs of businesses of all sizes. Our solution is:

  • Highly adaptable: senhasegura can be easily configured to meet the specific needs of your organization.
  • Transparent: senhasegura provides comprehensive monitoring and reporting capabilities so you can easily track all access and activity.
  • Quick to deploy: senhasegura has the shortest implementation time in the industry, so you can start protecting your data right away. Digital sovereignty is a fundamental right of citizens, institutions, and society. That's why we work every day.
close

Silverfort is the only Unified Identity Protection Platform that extends identity protection to any sensitive resource, including ones that couldn’t be protected before, without having to modify them. That includes legacy systems, command-line interfaces, IT/OT infrastructure, service accounts (non-human identities) and many more. Silverfort delivers secure authentication and access policies across the entire hybrid identity infrastructure – both legacy and modern – from a single unified platform, and stops identity-based threats everywhere. Silverfort is headquartered in Tel Aviv, Israel, and was founded in 2016.

close

Styra enables enterprises to define, enforce and monitor policy across their cloud-native environments. With a combination of open source (Open Policy Agent) and commercial solutions (Styra Load and Styra Declarative Authorization Service), Styra provides security, operations and compliance guardrails to protect applications, as well as the infrastructure they run on. Styra policy-as-code solutions lets developers, DevOps and security teams mitigate risks, reduce human error and accelerate application development.

close

Transmit Security was founded in 2014 with the aim of making customer identity and access management (CIAM) simple, secure and easy for customers to use. We started by providing advanced identity orchestration to handle the most complex CIAM use cases in the biggest and most security-aware companies on the planet.

From that experience, we have built a modern and modular CIAM platform that works for nearly every business, large or small, across any industry. Everyone deserves secure and delightful digital experiences.

With offices around the world, we are excited to help you better serve your customers, no matter where they are!

The partners are shown in alphabetical order.