Top 25 IAM Providers in the Cybersecurity 500 List for Q3 2015

Cyber security research and market intelligence firm Cybersecurity Ventures has released the latest iteration of its Cybersecurity 500 list, a global compilation of innovative companies providing cyber security solutions and services.
The list, which is updated quarterly, aims at creating “awareness and recognition for the most innovative cyber security companies,” according to a press release announcing the Q3 2015 update.
Selection and ranking criteria are subjective and include some or all of the following when evaluating each company:
- Cybersecurity Sector (market category)
- Problem(s) solved
- Customer Base
- Feedback from CISOs and Decision Makers
- Feedback from IT Security Evaluators & Recommenders
- Feedback from VARs, SIs and Consultants
- VC Funding
- Company Growth
- Published Product Reviews
- Demos and Presentations at Conferences
- Corporate Marketing and Branding
- Media Coverage
- Notable Implementations
- Founder and Management Pedigree
We’ve combed through the list and pulled the 25 top-ranked identity and access management vendors. Businesses are listed according to rank in the Cybersecurity 500 list. Businesses listed in red text also feature on our IAM solutions directory, and in our free 2015 IAM Solutions Buyer’s Guide.
Complementary Whitepaper: Protecting Privileged Accounts from Abuse
- Identify the advantages and risks of High-Privilege Access
- Assure security compliance
- Learn to better manage privileged identities
# |
Company Name |
Cybersecurity Industry Sector |
Corporate HQ |
7 | RSA | Intelligence Driven Security | Bedford, MA |
8 | IBM | Enterprise IT Security Solutions | Armonk, NY |
25 | SecuEra Technologies | Identity & Access Management Solutions | Washington DC |
28 | CyberArk | Cyber Threat Protection | Petach-Tikva, Israel |
29 | Splunk | Big Data Security (SIEM) | Cupertino CA |
75 | i-Sprint | Identity & Access Management | Chai Chee,Singapore |
109 | Xceedium | Privileged Identity Management | Herndon VA |
137 | Cryptovision | Cryptography & Electronic Identity | Gelsenkirchen,Germany |
141 | Courion | Identity & Access Management | Westborough MA |
170 | Centrify | Unified Identity Management | Santa Clara CA |
181 | TeleSign | Mobile Identity Verification | Marina Del Rey CA |
189 | Syntegrity Networks | Identity Management & Data Security | Fairfax VA |
209 | Okta | Enterprise Identity Management | San Francisco, CA |
210 | Ping Identity | Identity & Access Managment | Denver, CO |
226 | CA Technologies | Enterprise IT Security | New York City, NY |
228 | Mycroft | Identity & Access Management | New York City, NY |
228 | Mycroft | Identity & Access Management | New York City, NY |
236 | VU Security | Identity Security & Fraud Prevention | Buenos Aires, Argentina |
239 | Protected Networks | Identity & Access Rights Management | Berlin, Germany |
242 | Avatier | Identity Management | San Jose, CA |
245 | OneLogin | Enterprise Identity Management | San Francisco, CA |
247 | Radiant Logic | Enterprise Identity Management | Novato, CA |
257 | SailPoint | Identity & Access Management | Austin TX |
286 | Lieberman Software | Privileged Identity Management | Los Angeles, CA |
300 | GlobalSign | Authentication & Identity Service Provider | Portsmouth, NH |
You can check out the Cybersecurity 500 list in full, with descriptions for each vendor, here.
For a detailed market overview of IAM solutions, check out our free 2015 IAM solutions Buyer’s Guide here.
Interested in learning more about Identity Management? Check out these additional resources: