Notre réseau de partenaires IAM pour des solutions indépendantes

Des solutions IAM personnalisées basées sur une large gamme de produits partenaires

Chez iC Consult, nous nous engageons à être 100% indépendants des fournisseurs et 100% à l’écoute de nos clients, travaillant avec plus de 30 des meilleurs partenaires IAM afin de fournir des solutions qui donnent la priorité à vos besoins.​

30+

Partenaires

850+

Consultants

5000+

Projets

La qualité découle des choix


Nos clients sont au centre de nos préoccupations, et la qualité de nos services provient des multiples options que nous offrons.

Forts de notre expertise dans le domaine de la gestion des identités et des accès, nous sommes fiers de disposer d’un vaste réseau de partenaires comprenant plus de 30 vendeurs de logiciels de gestion des identités et des accès. Cela nous permet d’offrir des solutions personnalisées, indépendantes de n’importe quel fournisseur et parfaitement adaptées aux besoins individuels de nos clients.

Jetez un coup d’œil aux activités de nos partenaires et découvrez comment notre engagement en faveur de la formation continue et des échanges professionnels contribue à la réussite de nos clients.

Notre réseau de partenaires IAM

Nos partenaires stratégiques
close

Delinea is a leading provider of Privileged Access Management (PAM) solutions for the modern, hybrid enterprise. The Delinea Platform seamlessly extends PAM by providing authorization for all identities, controlling access to an organization’s most critical hybrid cloud infrastructure and sensitive data to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.

As organizations continue their digital transformations and move to the cloud, they are faced with increasingly complex privileged access requirements for the expanded threat landscape. But the opposite of complex isn’t simple – it’s seamless. The Delinea Platform seamlessly extends Privileged Access Management (PAM) by providing authorization for all identities across the modern, hybrid enterprise. We believe every user should be treated like a privileged user and wants seamless, secure access, even as administrators want privileged access controls without excess complexity. Our solutions put privileged access at the center of cybersecurity strategies by defining the boundaries of access.

With Delinea, privileged access is more accessible.

close

Omada is a market leading provider of IT security solutions for identity management and access governance. Omada delivers services within identity and access governance, risk management, compliance, role-based access management, and process governance.

Omada enables organizations to achieve compliance, reduce risk exposure, and maximize efficiency – providing policies, processes, and solutions for fulfillment of governance demands.

Established in 2000, Omada has operations in Europe and North America, delivering its solution via a network of skilled partners and system integrators. Omada is trusted by hundreds of customers including many global enterprises.

Since 2004, Omada has been experiencing an average growth of 60% and has consistently received the Triple ‘A’ credit ranking. Omada has also been named IT Company of the Year 2004 by IDG Computer World and identified as an “International Growth Comet” by the prestigious Massachusetts Institute of Technology (MIT).and process governance.

close

It actually began well before Saviynt was founded. Back in 2001, when Sachin Nayyar decided to create Vaau, he had a vision to create an Enterprise Role Management and Identity Compliance technology that would allow companies to manage their auditing and compliance costs. Brought into many of the Fortune 100 companies, the technology quickly became the standard for IGA. Fast forward to 2009, after Vaau was acquired by Sun Microsystems, and ultimately became part of Oracle’s ubiquitous GRC product, Sachin saw the need for a major upgrade to the now 10+ year old IGA solutions still being used by corporations around the globe. Enter Saviynt. Our vision is to redefine IGA by converging traditional Identity Management with CASB and Application GRC capabilities. In doing this, Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for cloud and enterprise. One of our most sought after features is the advanced risk analytics and intelligence capabilities, able to dig down to work at the fine-grained privilege management levels.

Since our founding in 2009, Sachin has built a world class team with deep expertise in IGA and Cloud Security. We now integrate with all of the mainstream applications, platforms and infrastructure being used today, as well as custom enterprise applications. Some of the largest companies in the world trust their security with the Saviynt platform, and the analyst community is once again sounding their praises of the company that Sachin built.

Nos autres fournisseurs
close

1Kosmos automates identity verification by detecting stolen and synthetic identities before new account origination. Our non-phishable, passwordless MFA solutions make logins fun and secure, protecting workers from password-based attacks and eliminating account takeover and financial fraud targeting customers.

close

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers are using AWS to lower costs, become more agile, and innovate faster.

close

The Axiomatics Orchestrated Authorization solution is an attribute-based access control (ABAC) solution designed to address enterprise application and database access challenges across any type of infrastructure – on-premises, cloud or hybrid. This is the most complete platform available for enterprise-wide roll out of ABAC, enabling enterprises to manage access based on what their corporate access policy demands. Leveraging this platform, organizations can ensure critical corporate applications, data and processes are only accessed appropriately according to policies that address what a person has access to, how much access they have, when they get access and under what conditions. These access decisions are made in real-time, reflecting real-world enterprise situations including a workforce working from anywhere, an ever-increasing number of global data privacy regulations, and sophisticated bad actors.

close

cidaas provides an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With cidaas, companies create unique user identification and maximum security across all channels. Based on the standards OAuth2.0, OpenID, SAML 2.0 and its "Everything is an API" architecture, cidaas can be seamlessly integrated into any software landscape and scales to any company size.

With the cidaas ID validator, we offer an innovative service for simple and automated verification of ID documents within a few minutes. It enables highly secure and efficient online identity verification with the help of artificial intelligence & machine learning. Fully automated video-based legitimation takes place using an AutoIdent process, without interaction with another person. The cidaas ID validator not only impresses with its user-friendliness and maximum security but is also GDPR and eIDAS-compliant.

Widas ID GmbH presents cidaas as the premier European Cloud Identity & Access Management (CIAM & IAM) solution, along with the cidaas ID Validator—an innovative, fully automated solution for digital identity verification. The Widas Group has been offering "Software made in Germany" since 1997 and is proud to have developed cidaas, a comprehensive identity platform that is developed and hosted in Germany.

close

Clear Skye IGA is an identity security solution built on the ServiceNow Platform. It provides identity governance through access request, access certification, employee lifecycle automation, and workflow management. With identity data on the Now Platform, Clear Skye plugs directly into your business processes, provides deep identity control and insights, and builds the bridge between the business and IT.

close

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

close

EmpowerID is the award-winning all-in-one Identity Management and Cloud Security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external Cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready-to-use IAM functionality. In-depth out-of-the-box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. The latest advances in machine learning and role mining analytics assist organizations to uncover the optimal role model to minimize administrative workloads and an organization’s overall risk profile. A visual workflow process model and design studio with over 1,000 ready-to-use IAM workflows ensures that security processes adapt to match the unique needs of the organization and their industry.

close

Eviden designs the scope composed of Atos’ digital, cloud, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 53 countries. By uniting unique high-end technologies across the full digital continuum with 57,000 world-class talents, Eviden expands the possibilities of technologies for enterprises and public authorities, helping them to build their digital future. Eviden is an Atos Group business with an annual revenue of c. € 5 billion.

close

Google Cloud accélère la capacité de transformation numérique de l’ensemble des organisations et des secteurs d’activité grâce à des solutions professionnelles qui tirent parti des technologies novatrices de Google et des outils qui permettent de développer de façon plus durable. Dans plus de 200 pays et territoires, des organisations font confiance à Google Cloud pour soutenir leur croissance et résoudre leurs problèmes métier les plus critiques.

close

HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments.

close

IBM is a leading cloud platform and cognitive solutions company. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 employees serving clients in 170 countries. With Watson, the AI platform for business, powered by data, we are building industry-based solutions to real-world problems. For more than seven decades, IBM Research has defined the future of information technology with more than 3,000 researchers in 12 labs located across six continents.

close

IndyKite is building a new paradigm of customer centric, digital identity solutions, with a connected data core.

We want to help our clients to move beyond traditional IAM and driving business value across all their products and services.

With products that securely manage human, IoT, and machine identity, our products leverage machine learning to deliver context-aware authorization, knowledge driven decisions, trusted data sharing and risk analytics.

Built on a knowledge graph data model, IndyKite enables developers with flexible APIs through a growing open-source ecosystem.

close

Kong provides the foundation that enables any company to become an API-first company — speeding up time to market, creating new business opportunities, and delivering superior products and services.

Built on the world’s most adopted API gateway, Kong’s unified cloud API platform delivers fast, reliable, secure digital experiences. With Kong, organizations can increase developer productivity, security, and performance at scale with a single easy-to-use platform for API management, service mesh, and ingress controller.

close

Empowering IAM through Identity Orchestration

By combining powerful IAM features with a modern visual identity orchestration platform, Monokee adds value to your identities and their journeys.

With Monokee, you gain a comprehensive solution that empowers you to efficiently manage user identities, streamline access controls, and ensure compliance with ease.

Additionally, Monokee’s integration with decentralized identity technologies provides a future-proof solution that aligns with the ever-evolving landscape of digital identities.

close

Nevis develops security solutions for the digital world of tomorrow. Our portfolio includes passwordless logins, which are intuitive to use and offer optimal protection of user data. As a specialist in authentication, Nevis has more than twenty years of experience: until early 2020 as a part of AdNovum Informatik AG, and since then as an independent spin-off company. Nevis is the market leader for Identity and Access Management in Switzerland, and it protects over 80 percent of all e-banking transactions. Government authorities and leading service providers and industrial companies across the globe rely on Nevis solutions. In addition to its headquarters in Zurich, Nevis operates offices in Germany, the United Kingdom, and Hungary.

close

WORLD-CLASS IN DIGITAL IDENTITIES, ROLES, AND ENTITLEMENTS

Our team of enthusiastic security specialists, consultants, and developers commit every day to improve our customers’ identity and access performance. Our software digitalizes and simplifies time-consuming IT processes and gives your employees time for other important tasks.

We are an innovative security software vendor with university roots. The very core of our work deals with profound methodologies, excellent usability, and solutions for bringing together technology and business needs.

All our products are designed and developed in Germany. Our high-class consulting and support services are operated from Germany. Our customers include organizations in financial services, insurance, high technology industries, and retail, amongst others.

close

OpenText can help you tackle the most complex digital transformation programs with confidence. With the world’s most complete and integrated Information Management platform, we empower our customers to organize, integrate and protect data and content as it flows through business processes inside and outside their organization.

close

We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’ data.

Oracle Cloud Infrastructure offers higher performance, security, and cost savings. It is designed so businesses can move workloads easily from on-premises systems to the cloud, and between cloud and on-premises and other clouds. Oracle Cloud applications provide business leaders with modern applications that help them innovate, attain sustainable growth, and become more resilient.

The work we do is not only transforming the world of business--it's helping defend governments, and advance scientific and medical research. From nonprofits to companies of all sizes, millions of people use our tools to streamline supply chains, make HR more human, quickly pivot to a new financial plan, and connect data and people around the world.

At work, we embrace diversity, encourage personal and professional growth, and celebrate a global team of passionate people developing innovative technologies that help people and companies tackle real-world problems head-on.

close

PlainID is the Authorization Company. Our cutting edge solutions enable organizations to grow their business faster whether it be via our Policy Manager or Partner Manager product lines.

PlainID was founded in 2014 by a team of experienced security technologists determined to put an end to the challenges that businesses face when scaling up their IAM capabilities. The solution led to a completely new design that reduces all enterprise authorizations to a single point of view – making Authorization plain and simple for business owners to manage and control.

close

Radiant Logic, le spécialiste des données d’identité, aide les organisations à transformer leurs données d’identité en une ressource stratégique, leur permettant d’améliorer la prise de décision, d’accélérer l’innovation et de réduire les risques.

La plateforme de données d’identité RadiantOne permet d’éliminer la complexité des systèmes d’information. Elle facilite le déploiement d’une stratégie Identity-First en créant un référentiel de données d’identité faisant autorité pour les contrôles contextualisés en temps réel. Nous offrons une visibilité sans précédent ainsi que des recommandations concrètes permettant la détection et la correction intelligentes des risques grâce à l’analyse des identités basée sur l’IA/ML.

RadiantOne permet aux organisations de tirer pleinement parti de la richesse des informations en provenance de leur infrastructure, en combinant le contexte des données et l’analyse, pour déployer une gouvernance adaptée aux cas d’usage les plus avancés.

close

Resist attacks by reducing excessive access. Saporo improves your cyber resistance by prioritizing and reducing user and system access risks.
By anticipating how attackers can use your configuration weaknesses and user access permissions, Saporo provides you with the most effective actions you need to perform to improve your cyber resistance.

close

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise™ technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems while providing stronger protection against cyber-attacks. From being named a Gartner “Cool Vendor” in 2016, our 4th generation platform is now serving mid-sized to Fortune 50 customers around the globe.

close

As cybersecurity leaders and Active Directory (AD) experts, we know that identity-first security is the key to operational resilience. For more than 90% of today’s enterprise organizations, if AD isn’t secure, nothing is. Many of the world’s leading businesses trust Semperis to help them protect AD and Azure AD from escalating cyber threats. Nothing is off-limits to today’s cyberattackers, including emergency services, hospitals and healthcare providers, schools, and financial institutions. Whether your business is building businesses, saving lives, or serving citizens, we help you operate with confidence by protecting your critical identity infrastructure.

close

PAM should be an easy and innovative way to first adopt a culture of identity to prevent cyber attacks, to comply with global norms, regulations, frameworks, standards, and certifications, all while reducing stress and increasing confidence. A PAM solution can help you protect your data, comply with regulations, and give you peace of mind knowing that your systems are secure.

We aim to ensure companies' sovereignty over privileged actions and information. To achieve this, we act against data theft and traceability of administrators' actions on networks, servers, databases, and a myriad of devices. Additionally, we seek compliance with audit requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

senhasegura is a leading PAM provider that offers a comprehensive solution that meets the needs of businesses of all sizes. Our solution is:

  • Highly adaptable: senhasegura can be easily configured to meet the specific needs of your organization.
  • Transparent: senhasegura provides comprehensive monitoring and reporting capabilities so you can easily track all access and activity.
  • Quick to deploy: senhasegura has the shortest implementation time in the industry, so you can start protecting your data right away. Digital sovereignty is a fundamental right of citizens, institutions, and society. That's why we work every day.
close

Silverfort is the only Unified Identity Protection Platform that extends identity protection to any sensitive resource, including ones that couldn’t be protected before, without having to modify them. That includes legacy systems, command-line interfaces, IT/OT infrastructure, service accounts (non-human identities) and many more. Silverfort delivers secure authentication and access policies across the entire hybrid identity infrastructure – both legacy and modern – from a single unified platform, and stops identity-based threats everywhere. Silverfort is headquartered in Tel Aviv, Israel, and was founded in 2016.

close

Styra enables enterprises to define, enforce and monitor policy across their cloud-native environments. With a combination of open source (Open Policy Agent) and commercial solutions (Styra Load and Styra Declarative Authorization Service), Styra provides security, operations and compliance guardrails to protect applications, as well as the infrastructure they run on. Styra policy-as-code solutions lets developers, DevOps and security teams mitigate risks, reduce human error and accelerate application development.

close

The tenfold Software GmbH, based in Vienna, is focused on helping companies manage the growing demands of access management more efficiently and easily. With our innovative software solution "tenfold," we have successfully revolutionized the management of IT users and IT permissions—never before has it been so easy to automatically control all important processes in the IT user lifecycle while simultaneously knowing, at any given time, who across the company currently has which permissions. Together with our partners, we support clients from medium-sized and large enterprises across all conceivable industries.

close

Transmit Security gives businesses the modern tools they need to build secure, trusted and end-to-end digital identity journeys to innovate and grow. CX-focused, cybersecurity-conscious leaders rely on Transmit Security’s Platform to provide their customers with smooth experiences protected from fraud across all channels and devices. Transmit Security serves many of the world’s largest banks, insurers, retailers, and other leading brands, collectively responsible for more than $3.1 trillion in annual commerce. Transmit Security was co-founded by serial entrepreneurs and investors, Mickey Boodaei and Rakesh Loonkar in 2014 with the aim of changing the security identity landscape. In 2020, Deloitte recognized Transmit Security as the 5th fastest growing company in North America. In March, we were recognized by Fast Company as one of the 10 Most Innovative Security Companies of 2022.

Les partenaires sont classés par ordre alphabétique.