List of AWS Identity and Access Management Customers
Seattle, 98109-5210, WA,
United States
Since 2010, our global team of researchers has been studying AWS Identity and Access Management customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased AWS Identity and Access Management for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using AWS Identity and Access Management for Identity and Access Management (IAM) include: Ayala Corporation, a Philippines based Banking and Financial Services organisation with 60150 employees and revenues of $232.46 billion, Sysco, a United States based Distribution organisation with 76000 employees and revenues of $78.80 billion, Lockheed Martin, a United States based Aerospace and Defense organisation with 121000 employees and revenues of $71.04 billion, NedBank, a South Africa based Banking and Financial Services organisation with 25954 employees and revenues of $63.59 billion, Nationwide Financial, a United States based Insurance organisation with 25000 employees and revenues of $32.50 billion and many others.
Contact us if you need a completed and verified list of companies using AWS Identity and Access Management, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The AWS Identity and Access Management customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Altair Engineering | Professional Services | 3300 | $666M | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2018 | n/a |
In 2018, Altair Engineering implemented AWS Identity and Access Management as the central access control plane. AWS Identity and Access Management was configured to serve Identity and Access Management (IAM) needs for cloud resources across the company environment, with explicit focus on controlling access to VPC, EC2, S3, RDS and container platforms.
|
|
|
Ameriprise Financial | Banking and Financial Services | 13800 | $15.5B | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2020 | n/a |
In 2020 Ameriprise Financial implemented AWS Identity and Access Management, deploying a centralized Identity and Access Management (IAM) control plane to govern cloud access for data engineering and analytics workloads. The implementation was tied to enterprise data initiatives delivering timely reporting and advanced analytics for internal and external clients, with AWS Identity and Access Management used as the primary access control mechanism across those environments.
Configuration work emphasized role-based access and service-level policies, AWS Identity and Access Management roles and policies were assigned to AWS Lambda functions and used to secure serverless ETL pipelines that wrote to AWS Glue and were queried from Amazon Athena. IAM controls were applied to S3 data lakes, Amazon Redshift data warehouses, Amazon EMR processing clusters, EC2 instances, and to messaging components such as SQS and SNS to enforce least-privilege access for automated data workflows.
Integrations reflected the broader cloud data architecture, AWS Identity and Access Management was integrated with data pipeline processes feeding Redshift and with Lambda-triggered jobs that invoked Spark and SageMaker workloads for analytics and machine learning. The IAM implementation supported on-prem to cloud migration efforts and was incorporated into designed AWS landing zones to provide account-level boundaries and cross-account access patterns during migration and ongoing operations.
Governance focused on policy-driven access, the team defined IAM role templates and permission boundaries to standardize access for data engineers, data scientists, and ETL automation, and used IAM in concert with landing zone constructs to centralize credential and entitlement management. AWS Identity and Access Management was positioned as the foundational access governance layer for Ameriprise Financials cloud data platform supporting data ingestion, processing, reporting, and machine learning functions.
|
|
|
Axos Bank(former BofI Federal Bank) | Banking and Financial Services | 1989 | $1.2B | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2020 | n/a |
In 2020, Axos Bank implemented AWS Identity and Access Management to centrally manage access for cloud hosted development and data workloads. The deployment used AWS Identity and Access Management within the Identity and Access Management (IAM) category to create roles and groups for users and resources, and to provision both console and programmatic access for application services.
The technical architecture was hosted on AWS with Amazon EC2 instances provisioned and controlled via Boto3 and the EC2 command line interface, Django RESTful APIs delivering application services, and MongoDB and MySQL as persistence layers. IAM roles were applied to EC2 instances and service principals to enable automated tasks such as instance lifecycle operations, event tracking, and tensor computations using TensorFlow through programmatic AWS APIs.
Operationally the IAM implementation was embedded into developer and DevOps workflows and integrated with Git as the centralized source repository, Jenkins for continuous integration pipelines, and Docker for scheduling and deploying Python jobs. Role and group constructs in AWS Identity and Access Management governed access for CI pipelines, automated deployment agents, and service accounts, while Jira and Agile practices supported issue and release tracking.
Functional capabilities implemented included user and group management, policy based access assignments, programmatic access via Boto3, and service level permissions for EC2 and data processing workloads, all delivered through AWS Identity and Access Management. The record positions Axos Bank AWS Identity and Access Management as the control plane for authentication and authorization across development, data engineering, and operations functions.
|
|
|
Ayala Corporation | Banking and Financial Services | 60150 | $232.5B | Philippines | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2014 | n/a |
In 2014 Ayala Corporation implemented AWS Identity and Access Management to strengthen access controls across its SAP and broader AWS cloud estate. AWS Identity and Access Management served as the central Identity and Access Management (IAM) layer governing user and service access for Amazon EC2 instances running SAP HANA, associated Amazon EBS storage, and cloud operational tooling.
The implementation focused on centralized access governance and policy-driven controls, leveraging IAM to define role-based permissions, scoped policies, and service-level credentials for application and infrastructure components. Configuration work centered on account-level IAM policies and identity boundaries to enforce least privilege for database, application, and administrative roles supporting SAP HANA workloads and other business applications.
IAM was integrated with the AWS compute and observability stack explicitly documented in the deployment, including Amazon EC2 memory-optimized R4 instances, Amazon EBS persistent volumes, Amazon CloudWatch for monitoring, and AWS Lambda for automation. The operational coverage included Ayala Corporation’s Ayala Land unit environments used for sales reservation processing and SAP reporting, with governance applied across IT infrastructure, database administration, and lines of business consuming the SAP outputs.
Governance and operational practices combined IAM policy management with AWS Support under the Business Support Plan and internal IT stewardship for ongoing administration. Explicit outcomes tied to the broader AWS adoption included lower infrastructure cost, reduced data center maintenance, faster resource provisioning, automatic operational workflows via CloudWatch and Lambda, retirement of 90 TB of storage and EMC VNX hardware, a documented 24 percent lower total cost of ownership in TCO analysis, and materially faster SAP HANA reporting enabled by AWS Direct Connect and memory-optimized EC2 instances.
|
|
|
Barclays USA | Banking and Financial Services | 1000 | $250M | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2020 | n/a |
In 2020 Barclays USA configured AWS Identity and Access Management to strengthen access controls across application stacks, aligning with its Identity and Access Management (IAM) objectives. The implementation concentrated on configuring IAM groups and users to support authentication requirements for both web interfaces and service endpoints.
AWS Identity and Access Management was applied alongside application level controls, with customized authentication implemented in Spring Security to verify user roles and secure user pages. The environment included Single Page Applications built with Angular 13 and backend services developed in Java 1.8 using Spring Boot, Hibernate, RESTful web services, and microservice patterns, which leveraged the IAM user and group constructs for login and role mapping.
Integrations and operational coverage reflect a hybrid cloud and platform mix, with periodic exporting of SQL Server data into Elastic search and deployments of Spring MVC and Spring Boot applications to AWS Elastic Beanstalk. Microservices communicated through REST and Apache Kafka, data preprocessing used Hadoop MapReduce and HDFS, and select applications were deployed to Pivotal Cloud Foundry using blue green deployment, with IAM providing centralized identity controls for these deployment targets.
Governance and workflows were documented and managed using JIRA for defect tracking, GIT for version control, and Maven for build automation, with recurring defect documentation retained for operational handover. Role based access governance combined AWS Identity and Access Management group membership and Spring Security role checks to enforce authentication and authorization across UI, API, and background processing components.
|
|
|
|
Banking and Financial Services | 3772 | $6.6B | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2015 | n/a |
|
|
|
|
Banking and Financial Services | 2500 | $1.5B | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2017 | n/a |
|
|
|
|
Banking and Financial Services | 350 | $100M | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2020 | n/a |
|
|
|
|
Banking and Financial Services | 18676 | $8.3B | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2018 | n/a |
|
|
|
|
Banking and Financial Services | 1421 | $104M | United States | Amazon Web Services (AWS) | AWS Identity and Access Management | Identity and Access Management (IAM) | 2022 | n/a |
|
Buyer Intent: Companies Evaluating AWS Identity and Access Management
- NTT Corporation, a Japan based Professional Services organization with 338467 Employees
- Moksh Tech United States, a United States based Professional Services company with 10 Employees
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated |
|---|---|---|---|---|---|---|
| NTT Corporation | Professional Services | 338467 | $87.0B | Japan | 2026-02-04 | |
| Moksh Tech United States | Professional Services | 10 | $3M | United States | 2025-11-07 |