ID Agent References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3036)
    Verified42+ References
  • 4.7 / 5.0 (4466)
    Premium240+ References
  • 4.7 / 5.0 (4000)
    Premium251+ References

ID Agent Case Studies

  • How Computer Concepts USA protects and educates clients with dark web monitoring from Dark Web ID and security awareness training from BullPhish ID

  • How Thiry Tech helps defense contractors maintain security and compliance with IT Complete

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References42 total
    About

    Avatier develops software and delivers services that automate IT operations. Their identity management and access governance solutions make organizations more secure and productive in the shortest time at the lowest costs. Avatier is the only company providing solutions that adapt to the needs of the business user delivering a unified framework for business processes across operations.

  • Reference Rating
    4.7 / 5.0
    Customer References240 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References251 total
    About

    SailPoint Technologies is the leader in enterprise identity governance, brings the Power of Identity to customers around the world. As the fastest-growing, independent identity and access management provider, SailPoint helps hundreds of the world's largest organizations securely and effectively deliver and manage user access from any device to data and applications residing in the data center, on mobile devices, and in the cloud.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked