Optimal IdM is a global provider of identity management consulting and software.

Work for TheOptimalCloud?

Learning about TheOptimalCloud?

We can help you find the solution that fits you best.

Find the Right Product

TheOptimalCloud Reviews

Ask TheOptimalCloud a Question
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 TheOptimalCloud review
LinkedIn Connections
TheOptimalCloud review by Administrator in Law Practice
Administrator in Law Practice
Validated Reviewer
Verified Current User
Review Source

"The Optimal Cloud: A comprehensive and highly flexible solution"

What do you like best?

Provides a great deal of flexibility for integrating disparate internal user data stores with various cloud applications; The user interface is highly customizable; Quick and easy service start-up process; Reduced involvement with integrating 3rd party applications; Excellent product support

What do you dislike?

Not as well known as competing products so not many 3rd party apps will claim 'out of box' integration ability (has yet to be a problem).

What business problems are you solving with the product? What benefits have you realized?

Our goal was to establish a scalable cloud federation infrastructure while minimizing operational overhead. The Optimal Cloud enabled us to quickly deploy a highly scalable and flexible solution to address our cloud integration goals. Ongoing integration of cloud applications has proven to be a very straight forward process.

Sign in to G2 Crowd to see what your connections have to say about TheOptimalCloud

What Privileged Access Management solution do you use?

Thanks for letting us know!

There are not enough reviews of TheOptimalCloud for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

Centrify Application Services Logo
Centrify Application Services
Centrify Application Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s users as well as its privileged accounts.
Foxpass Logo
Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.
Oracle Identity Management Logo
Oracle Identity Management
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.
AWS Identity and Access Management (IAM) Logo
AWS Identity and Access Management (IAM)
AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
Centrify Infrastructure Services Logo
Centrify Infrastructure Services
Centrify Infrastructure Services is designed to help minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.
CyberArk Logo
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
ManageEngine ADManager Plus Logo
ManageEngine ADManager Plus
Active Directory Management and Reporting Solution
PingOne Logo
PingOne® offers secure single sign-on for your employees from any device and gives IT one dashboard to manage user access for all applications.
IBM Cloud Identity Service Logo
IBM Cloud Identity Service
One service to take care of every identity and access management (IAM) need - that's what Cloud Identity Service will mean for your business. For a similar investment as shallow cloud-based IAM products, which only represent federated SSO and a few other IAM capabilities, Cloud Identity Service enables you to adopt cloud for your entire IAM system.
10 Logo
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure.
Show more
Kate from G2 Crowd

Learning about TheOptimalCloud?

I can help.
* We monitor all TheOptimalCloud reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.