TheOptimalCloud

5.0
(1)

Optimal IdM is a global provider of identity management consulting and software.

Work for TheOptimalCloud?

Learning about TheOptimalCloud?

We can help you find the solution that fits you best.

TheOptimalCloud Reviews

Ask TheOptimalCloud a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 TheOptimalCloud review
LinkedIn Connections
TheOptimalCloud review by Administrator in Law Practice
Administrator in Law Practice
Validated Reviewer
Verified Current User
Review Source
content

"The Optimal Cloud: A comprehensive and highly flexible solution"

What do you like best?

Provides a great deal of flexibility for integrating disparate internal user data stores with various cloud applications; The user interface is highly customizable; Quick and easy service start-up process; Reduced involvement with integrating 3rd party applications; Excellent product support

What do you dislike?

Not as well known as competing products so not many 3rd party apps will claim 'out of box' integration ability (has yet to be a problem).

What problems are you solving with the product? What benefits have you realized?

Our goal was to establish a scalable cloud federation infrastructure while minimizing operational overhead. The Optimal Cloud enabled us to quickly deploy a highly scalable and flexible solution to address our cloud integration goals. Ongoing integration of cloud applications has proven to be a very straight forward process.

Sign in to G2 to see what your connections have to say about TheOptimalCloud

What Privileged Access Management solution do you use?

Thanks for letting us know!

There are not enough reviews of TheOptimalCloud for G2 to provide buying insight. Below are some alternatives with more reviews:

1
AWS Identity and Access Management (IAM) Logo
AWS Identity and Access Management (IAM)
4.4
(62)
AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
2
SecureLink for Enterprise Logo
SecureLink for Enterprise
4.2
(42)
Trying to authenticate, provision, and audit a rotating population of support technicians is a challenge that often results in shared logins, security vulnerabilities, and a lack of vendor accountability. We deliver a purpose-built secure remote access platform that ensures industry compliance and vendor accountability.
3
Foxpass Logo
Foxpass
4.8
(34)
Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.
4
Oracle Identity Management Logo
Oracle Identity Management
3.8
(32)
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.
5
JumpCloud Logo
JumpCloud
4.5
(24)
JumpCloud is a directory-as-a-service (DaaS), designed to securely connect employee identities to IT resources- devices, apps, & networks.
6
Thycotic Secret Server Logo
Thycotic Secret Server
4.6
(18)
Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price.
7
AWS Directory Service Logo
AWS Directory Service
4.2
(18)
AWS Directory Service is a service that setup and run Microsoft Active Directory (AD) in the AWS cloud, or connect AWS resources with an existing on-premises Microsoft Active Directory and can use it to manage users and groups, provide single sign-on to applications and services, create and apply group policy, domain join Amazon EC2 instances, as well as simplify the deployment and management of cloud-based Linux and Microsoft Windows workloads.
8
CyberArk Logo
CyberArk
4.2
(13)
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
9
AWS Secrets Manager Logo
AWS Secrets Manager
4.5
(14)
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
10
Workspace ONE Logo
Workspace ONE
4.2
(14)
Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint management. It is available as a cloud service or for on-premises deployment.
Show more
Kate from G2

Learning about TheOptimalCloud?

I can help.
* We monitor all TheOptimalCloud reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.