List of Heroic EPIC Customers
Lehi, 84043, UT,
United States
Since 2010, our global team of researchers has been studying Heroic EPIC customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Heroic EPIC for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Heroic EPIC for Identity and Access Management (IAM) include: Google, a United States based Communications organisation with 190820 employees and revenues of $402.84 billion, Ibm, a United States based Professional Services organisation with 288300 employees and revenues of $60.53 billion, Brigham Young University, a United States based Education organisation with 5000 employees and revenues of $1.00 billion and many others.
Contact us if you need a completed and verified list of companies using Heroic EPIC, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Heroic EPIC customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Brigham Young University | Education | 5000 | $1.0B | United States | Heroic | Heroic EPIC | Identity and Access Management (IAM) | 2018 | n/a |
In 2018, Brigham Young University was listed as a client logo on Heroic's partner page, indicating a U.S.-based relationship involving Heroic EPIC. The partner listing associates Heroic EPIC and Heroic's DarkWatch credential exposure capability with detection of exposed student, faculty, and staff credentials and with prioritization of remediation actions inside the university's IT and security processes. Module usage and exact go live timing are inferred from the vendor partner listing because Heroic does not publish a detailed public case study naming BYU and Heroic EPIC explicitly.
The implementation signal centers on credential exposure detection, prioritized remediation workflows, and identity risk prioritization consistent with an Identity and Access Management (IAM) deployment. Heroic EPIC is described in vendor materials as supporting automated discovery of exposed credentials, risk scoring, and remediation prioritization, which would integrate into BYU operational workflows for account remediation and security operations. Specific architectural topology, named system integrations, and rollout governance for BYU are not documented publicly, so the operational scope should be interpreted as focused on student, faculty, and staff identity protection within the university's IT and security processes.
|
|
|
Communications | 190820 | $402.8B | United States | Heroic | Heroic EPIC | Identity and Access Management (IAM) | 2018 | n/a |
In 2018, Google implemented Heroic EPIC within its Identity and Access Management (IAM) tooling to strengthen detection of credential compromise and account-based threats. Google is listed among Heroic's Brands We Work With on the vendor partner page, which implies a collaboration focused on credential monitoring and identity threat detection to protect online accounts and services in the United States. The use of Heroic EPIC is presented as a capability to operationalize continuous credential surveillance and identity telemetry across consumer and enterprise account surfaces.
Deployment emphasis for Heroic EPIC centers on credential breach ingestion, continuous credential monitoring, identity threat detection, account takeover detection, alerting, and orchestration of remediation workflows for security and identity operations teams. Operational coverage is described at the account protection and authentication monitoring layer, with outputs intended to feed incident response and identity governance processes rather than acting as a standalone identity store. Governance and process changes implied by the listing include embedding continuous credential monitoring into security operations and account protection workflows, and configuring Heroic EPIC detection rules and remediation playbooks to align with Google security operations and identity teams.
|
|
|
|
Ibm | Professional Services | 288300 | $60.5B | United States | Heroic | Heroic EPIC | Identity and Access Management (IAM) | 2018 | n/a |
In 2018 IBM engaged Heroic and appears on Heroic's public partner listing in the United States for use of Heroic EPIC. Heroic EPIC was positioned to support Identity and Access Management (IAM) by monitoring compromised credentials and supporting IT and security identity and access operations to reduce account takeover risk.
Implementation signals point to use of Heroic EPIC alongside Heroic DarkWatch capabilities to continuously surface credential exposure, detect compromised credentials, and generate prioritized alerts for remediation. Functional capabilities described align with Identity and Access Management (IAM) workflows, including compromised credential detection, exposure monitoring, account risk scoring, and alert orchestration for identity owners and security teams.
Operational coverage was focused on IBM's IT and security identity and access teams in the United States, where external credential exposure signals were intended to feed into incident response and access governance processes. The deployment pattern corresponds to standard IAM architectures that route external compromise intelligence into triage, access review, and remediation workflows.
Governance emphasis for the implementation centers on centralized credential monitoring, alert triage, and coordinated remediation between security operations and identity owners. The partner listing indicates the configuration was aimed at reducing account takeover risk by delivering continuous credential exposure visibility to IBM's identity and access operations.
|
Buyer Intent: Companies Evaluating Heroic EPIC
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||