Description

Use centralised identity management software to lower risk and manage user access. Keep operations running efficiently and affordably, while protecting applications and data. Provide user access according to current business roles. Manage passwords with self-service capabilities and approval workflows.

Website:

Click Here

Reviews:

Events:

Vedors / Consultants:

Reviews and Dashboard

Rating 5/5
Ease of use 4/5
Microsoft Technology yes
Java Based Yes