List of Google Cloud Identity and Access Management Customers
Mountain View, 94043, CA,
United States
Since 2010, our global team of researchers has been studying Google Cloud Identity and Access Management customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Google Cloud Identity and Access Management for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Google Cloud Identity and Access Management for Identity and Access Management (IAM) include: Veolia, a France based Utilities organisation with 202332 employees and revenues of $49.17 billion, Snap, a United States based Media organisation with 5367 employees and revenues of $4.60 billion, GoHenry, a United Kingdom based Banking and Financial Services organisation with 271 employees and revenues of $40.0 million and many others.
Contact us if you need a completed and verified list of companies using Google Cloud Identity and Access Management, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Google Cloud Identity and Access Management customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
GoHenry | Banking and Financial Services | 271 | $40M | United Kingdom | Google Cloud Identity and Access Management | Identity and Access Management (IAM) | 2018 | Rackspace |
In 2018, GoHenry implemented Google Cloud Identity and Access Management to centralize authentication and authorization across its cloud footprint. The deployment established Identity and Access Management (IAM) controls for back-office systems and databases across GoHenry's UK and US operations following a migration of the majority of services to Google Cloud.
The implementation configured Cloud Identity alongside Google Cloud Identity and Access Management to deliver granular, role based access control and two factor protected access. Functional capabilities included centralized identity provisioning, automated onboarding and offboarding workflows, policy based access enforcement, and multifactor authentication to secure finance facing systems and child user data.
Rackspace Technology supported the rollout, providing implementation services during configuration and cutover phases on Google Cloud. Governance was centralized under the IAM platform, consolidating identity governance, access review processes, and operational controls for back office and database access across business functions in both regions.
The project helped GoHenry scale operations to support over one million customers while protecting sensitive financial and child user data. Google Cloud Identity and Access Management serves as the primary control plane for authentication and authorization across GoHenry's cloud services.
|
|
|
|
Snap | Media | 5367 | $4.6B | United States | Google Cloud Identity and Access Management | Identity and Access Management (IAM) | 2016 | n/a |
In 2016, Snap implemented Google Cloud Identity and Access Management to enforce fine grained, ephemeral access controls across its US engineering environment. The deployment targeted hundreds of Google Cloud Platform projects and established an organizational node to prevent shadow projects within the Snap infrastructure.
The implementation leveraged IAM Roles and IAM Service Account APIs to provision role grants and ephemeral credentials, implementing temporary ACL leases for short lived access. Functional capabilities emphasized fine grained role assignment, service account lifecycle control, and role based data siloing to limit cross project access and reduce ungoverned privilege spread.
Operational coverage focused on Snap engineering teams responsible for development, testing, and production workloads in the United States, applying Identity and Access Management (IAM) controls at both project and organization levels. Google Cloud Identity and Access Management configuration was embedded into project onboarding and access workflows to standardize permission issuance and enforce consistent access patterns across projects.
Governance was structured around ephemeral access leases and centralized role definitions to enforce least privilege and prevent shadow projects, shifting operational workflows for access requests and service account usage. The security oriented implementation reduced risk by using temporary ACL leases and role based data siloing across hundreds of GCP projects.
|
|
|
|
Veolia | Utilities | 202332 | $49.2B | France | Google Cloud Identity and Access Management | Identity and Access Management (IAM) | 2019 | n/a |
In 2019, Veolia deployed Google Cloud Identity and Access Management as part of a security and governance initiative across its global Google Cloud Platform footprint. The effort explicitly used Google Cloud Identity and Access Management and its Policy Intelligence features, including IAM Recommender, to assess and remediate policy bindings at the project level.
The implementation focused on Policy Intelligence driven analysis and the IAM Recommender capability to identify excessive permissions and generate least privilege recommendations. Configuration work centered on scanning project level role bindings, surfacing recommended role changes, and orchestrating a one time remediation campaign to reduce permission sprawl while preserving required access.
Operational coverage spanned Veolia's global projects and targeted both user accounts and service accounts, securing over 1,000 user and service accounts across the company environment. Business functions directly impacted included cloud security, identity and access management, and cloud operations, with remediation activity coordinated against project level IAM policies.
Governance was adjusted to incorporate Policy Intelligence outputs into centralized review and remediation workflows, aligning permission cleanup with ongoing security and governance processes. The one time cleanup removed around 1.2 million permissions, demonstrating use of Google Cloud Identity and Access Management in the Identity and Access Management (IAM) category to enforce least privilege across Veolia's global GCP footprint.
|
Buyer Intent: Companies Evaluating Google Cloud Identity and Access Management
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||