Comparative Analysis of Cloud Security, Identity & Access

Home » Comparative Analysis of Cloud Security, Identity & Access
ServiceDescriptionAWSAzureGCPBluemix
Authentication and
authorization
Allows users to securely control access to services and
resources while offering data security and protection.
Identity and Access
Management (IAM>
Active Directory
Active Directory Premium
Managed Service Identity
Cloud IAM
App ID
IBM Security Access Manager
IBM Security Identity Governance and Intelligence
Security policy and role management for working
with multiple accounts.
OrganizationsSubscription and Service
Management + RBAC
Resource Manager
Helps safeguard access to data and applications while
meeting user demand for a simple sign-in process while
delivering a range of verification options.
Multi-Factor AuthenticationMulti-Factor AuthenticationSecurity Key EnforcementCloud Identity Connect
Information protectionService to help control and secure email, documents, and
sensitive data shared outside of users’ own companies.
Information ProtectionData Loss Prevention API
EncryptionHelps protect and safeguard data while meeting
organizational security and compliance commitments.
Server-side encryption with
Amazon S3 Key Management
Service
Storage Service EncryptionKey Management ServiceKey Protect
Provides security solutions and works with other services
by offering a way to manage, create, and control
encryption keys stored in hardware security modules.
Key Management Service
CloudHSM
Key VaultKey Management ServiceKey Protect
FirewallA firewall that protects web applications from
common web exploits.
Web Application FirewallApplication Gateway Web
Application Firewall
Identity-Aware Proxy
Security Scanner
Network as a service
ThirdEye Data

Data Answers

ThirdEye answers your data questions and offers actionable insights, real-world experiences and strategic recommendations.

By | 2018-08-01T06:21:17+00:00 February 16th, 2018|Comparative Analysis, Technologies|