TheOptimalCloud

(1)
5.0 out of 5 stars

Optimal IdM is a global provider of identity management consulting and software.

Work for TheOptimalCloud?
Rsa securid access  cloud identity and access management  2x

Learning about TheOptimalCloud?

We can help you find the solution that fits you best.

TheOptimalCloud Reviews

Ask TheOptimalCloud a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
User Industry
Showing 1 TheOptimalCloud review
LinkedIn Connections
TheOptimalCloud review by Administrator in Law Practice
Administrator in Law Practice
Validated Reviewer
Verified Current User
Invitation from G2 Crowd
Reviewed On

The Optimal Cloud: A comprehensive and highly flexible solution

What do you like best?

Provides a great deal of flexibility for integrating disparate internal user data stores with various cloud applications; The user interface is highly customizable; Quick and easy service start-up process; Reduced involvement with integrating 3rd party applications; Excellent product support

What do you dislike?

Not as well known as competing products so not many 3rd party apps will claim 'out of box' integration ability (has yet to be a problem).

What business problems are you solving with the product? What benefits have you realized?

Our goal was to establish a scalable cloud federation infrastructure while minimizing operational overhead. The Optimal Cloud enabled us to quickly deploy a highly scalable and flexible solution to address our cloud integration goals. Ongoing integration of cloud applications has proven to be a very straight forward process.

Sign in to G2 Crowd to see what your connections have to say about TheOptimalCloud
Headshots

What Cloud Identity and Access Management solution do you use?

Thanks for letting us know!

There are not enough reviews of TheOptimalCloud for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
(181)
Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall
2
Centrify Application Services Logo
Centrify Application Services
(60)
Centrify Application Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s users as well as its privileged accounts.
3
Microsoft Azure Active Directory Logo
Microsoft Azure Active Directory
(50)
Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
4
RSA SecurID® Access Logo
RSA SecurID® Access
(47)
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
5
OneLogin Logo
OneLogin
(46)
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
6
Salesforce Platform: Identity Logo
Salesforce Platform: Identity
(41)
Salesforce App Cloud provides an out-of-the-box identity solution using open standards, including SAML, OpenID Connect, OAuth, and SCIM. Now IT can manage apps, users, and data sharing with simplicity and transparency.
7
Bitium Logo
Bitium
(40)
Unified Cloud Management System including single sign-on identity/access management, password control, corporate insights, security, and more.
8
AWS Identity and Access Management (IAM) Logo
AWS Identity and Access Management (IAM)
(17)
AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
9
Gigya Logo
Gigya
(14)
The Trusted Platform for Identity-Driven Relationships
10
CyberArk Logo
CyberArk
(12)
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
Show more
Kate avatar
Kate from G2 Crowd

Learning about TheOptimalCloud?

I can help.
* We monitor all TheOptimalCloud reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.