AI Buyer Insights:

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

List of AWS Identity and Access Management Customers

loading spinner icon



Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Altair Engineering Professional Services 3300 $666M United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2018 n/a
In 2018, Altair Engineering implemented AWS Identity and Access Management as the central access control plane. AWS Identity and Access Management was configured to serve Identity and Access Management (IAM) needs for cloud resources across the company environment, with explicit focus on controlling access to VPC, EC2, S3, RDS and container platforms.
Ameriprise Financial Banking and Financial Services 13800 $15.5B United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2020 n/a
In 2020 Ameriprise Financial implemented AWS Identity and Access Management, deploying a centralized Identity and Access Management (IAM) control plane to govern cloud access for data engineering and analytics workloads. The implementation was tied to enterprise data initiatives delivering timely reporting and advanced analytics for internal and external clients, with AWS Identity and Access Management used as the primary access control mechanism across those environments. Configuration work emphasized role-based access and service-level policies, AWS Identity and Access Management roles and policies were assigned to AWS Lambda functions and used to secure serverless ETL pipelines that wrote to AWS Glue and were queried from Amazon Athena. IAM controls were applied to S3 data lakes, Amazon Redshift data warehouses, Amazon EMR processing clusters, EC2 instances, and to messaging components such as SQS and SNS to enforce least-privilege access for automated data workflows. Integrations reflected the broader cloud data architecture, AWS Identity and Access Management was integrated with data pipeline processes feeding Redshift and with Lambda-triggered jobs that invoked Spark and SageMaker workloads for analytics and machine learning. The IAM implementation supported on-prem to cloud migration efforts and was incorporated into designed AWS landing zones to provide account-level boundaries and cross-account access patterns during migration and ongoing operations. Governance focused on policy-driven access, the team defined IAM role templates and permission boundaries to standardize access for data engineers, data scientists, and ETL automation, and used IAM in concert with landing zone constructs to centralize credential and entitlement management. AWS Identity and Access Management was positioned as the foundational access governance layer for Ameriprise Financials cloud data platform supporting data ingestion, processing, reporting, and machine learning functions.
Axos Bank(former BofI Federal Bank) Banking and Financial Services 1989 $1.2B United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2020 n/a
In 2020, Axos Bank implemented AWS Identity and Access Management to centrally manage access for cloud hosted development and data workloads. The deployment used AWS Identity and Access Management within the Identity and Access Management (IAM) category to create roles and groups for users and resources, and to provision both console and programmatic access for application services. The technical architecture was hosted on AWS with Amazon EC2 instances provisioned and controlled via Boto3 and the EC2 command line interface, Django RESTful APIs delivering application services, and MongoDB and MySQL as persistence layers. IAM roles were applied to EC2 instances and service principals to enable automated tasks such as instance lifecycle operations, event tracking, and tensor computations using TensorFlow through programmatic AWS APIs. Operationally the IAM implementation was embedded into developer and DevOps workflows and integrated with Git as the centralized source repository, Jenkins for continuous integration pipelines, and Docker for scheduling and deploying Python jobs. Role and group constructs in AWS Identity and Access Management governed access for CI pipelines, automated deployment agents, and service accounts, while Jira and Agile practices supported issue and release tracking. Functional capabilities implemented included user and group management, policy based access assignments, programmatic access via Boto3, and service level permissions for EC2 and data processing workloads, all delivered through AWS Identity and Access Management. The record positions Axos Bank AWS Identity and Access Management as the control plane for authentication and authorization across development, data engineering, and operations functions.
Ayala Corporation Banking and Financial Services 60150 $232.5B Philippines Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2014 n/a
In 2014 Ayala Corporation implemented AWS Identity and Access Management to strengthen access controls across its SAP and broader AWS cloud estate. AWS Identity and Access Management served as the central Identity and Access Management (IAM) layer governing user and service access for Amazon EC2 instances running SAP HANA, associated Amazon EBS storage, and cloud operational tooling. The implementation focused on centralized access governance and policy-driven controls, leveraging IAM to define role-based permissions, scoped policies, and service-level credentials for application and infrastructure components. Configuration work centered on account-level IAM policies and identity boundaries to enforce least privilege for database, application, and administrative roles supporting SAP HANA workloads and other business applications. IAM was integrated with the AWS compute and observability stack explicitly documented in the deployment, including Amazon EC2 memory-optimized R4 instances, Amazon EBS persistent volumes, Amazon CloudWatch for monitoring, and AWS Lambda for automation. The operational coverage included Ayala Corporation’s Ayala Land unit environments used for sales reservation processing and SAP reporting, with governance applied across IT infrastructure, database administration, and lines of business consuming the SAP outputs. Governance and operational practices combined IAM policy management with AWS Support under the Business Support Plan and internal IT stewardship for ongoing administration. Explicit outcomes tied to the broader AWS adoption included lower infrastructure cost, reduced data center maintenance, faster resource provisioning, automatic operational workflows via CloudWatch and Lambda, retirement of 90 TB of storage and EMC VNX hardware, a documented 24 percent lower total cost of ownership in TCO analysis, and materially faster SAP HANA reporting enabled by AWS Direct Connect and memory-optimized EC2 instances.
Barclays USA Banking and Financial Services 1000 $250M United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2020 n/a
In 2020 Barclays USA configured AWS Identity and Access Management to strengthen access controls across application stacks, aligning with its Identity and Access Management (IAM) objectives. The implementation concentrated on configuring IAM groups and users to support authentication requirements for both web interfaces and service endpoints. AWS Identity and Access Management was applied alongside application level controls, with customized authentication implemented in Spring Security to verify user roles and secure user pages. The environment included Single Page Applications built with Angular 13 and backend services developed in Java 1.8 using Spring Boot, Hibernate, RESTful web services, and microservice patterns, which leveraged the IAM user and group constructs for login and role mapping. Integrations and operational coverage reflect a hybrid cloud and platform mix, with periodic exporting of SQL Server data into Elastic search and deployments of Spring MVC and Spring Boot applications to AWS Elastic Beanstalk. Microservices communicated through REST and Apache Kafka, data preprocessing used Hadoop MapReduce and HDFS, and select applications were deployed to Pivotal Cloud Foundry using blue green deployment, with IAM providing centralized identity controls for these deployment targets. Governance and workflows were documented and managed using JIRA for defect tracking, GIT for version control, and Maven for build automation, with recurring defect documentation retained for operational handover. Role based access governance combined AWS Identity and Access Management group membership and Spring Security role checks to enforce authentication and authorization across UI, API, and background processing components.
Banking and Financial Services 3772 $6.6B United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2015 n/a
Banking and Financial Services 2500 $1.5B United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2017 n/a
Banking and Financial Services 350 $100M United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2020 n/a
Banking and Financial Services 18676 $8.3B United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2018 n/a
Banking and Financial Services 1421 $104M United States Amazon Web Services (AWS) AWS Identity and Access Management Identity and Access Management (IAM) 2022 n/a
Showing 1 to 10 of 28 entries

Buyer Intent: Companies Evaluating AWS Identity and Access Management

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating AWS Identity and Access Management. Gain ongoing access to real-time prospects and uncover hidden opportunities. Companies Actively Evaluating AWS Identity and Access Management for Identity and Access Management (IAM) include:

  1. NTT Corporation, a Japan based Professional Services organization with 338467 Employees
  2. Moksh Tech United States, a United States based Professional Services company with 10 Employees

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
NTT Corporation Professional Services 338467 $87.0B Japan 2026-02-04
Moksh Tech United States Professional Services 10 $3M United States 2025-11-07
FAQ - APPS RUN THE WORLD AWS Identity and Access Management Coverage

AWS Identity and Access Management is a Identity and Access Management (IAM) solution from Amazon Web Services (AWS).

Companies worldwide use AWS Identity and Access Management, from small firms to large enterprises across 21+ industries.

Organizations such as Ayala Corporation, Sysco, Lockheed Martin, NedBank and Nationwide Financial are recorded users of AWS Identity and Access Management for Identity and Access Management (IAM).

Companies using AWS Identity and Access Management are most concentrated in Banking and Financial Services, Distribution and Aerospace and Defense, with adoption spanning over 21 industries.

Companies using AWS Identity and Access Management are most concentrated in Philippines, United States and South Africa, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of AWS Identity and Access Management across Americas, EMEA, and APAC.

Companies using AWS Identity and Access Management range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 10.71%, large organizations with 1,001-10,000 employees - 35.71%, and global enterprises with 10,000+ employees - 53.57%.

Customers of AWS Identity and Access Management include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified AWS Identity and Access Management customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).