Affordably Source Forgerock Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Forgerock Inquiries

Area Icon

Identity Access Management

Our client would like to speak with multiple it and information security professionals who have significant experience in iam (identity access management), security, and/or passwordless authentication. Desired participants’ leadership expertise must be fully or partially focused on b2b technology. Each participant. Will be paid $250 for this 60-min web interview. An additional $150 is also available for every successful referral from another organization. Qualifying questions please answer the question below if you are interested in participating. - how would you characterize your thought leadership expertise? A. Primarily focused on consumer technology (b2c) b. Primarily focused on b2b technology c. Equally focused on b2c and b2b technology d. None of these this is a market research study and not a sales solicitation.

  1. Profile Picture

    Edward | Manager - M&A Cyber Due Diligence

    I’ve worked in IAM at PwC for 6 years. Answer is C...

    15.6 Hours Later
  2. Profile Picture

    Codi |_

    C. Experience with Ping, Okta, and Rippling. Currently undergoing an IAM vendor search to bring stre...

    16.1 Hours Later
  3. Profile Picture

    Jeff |Security and Privacy Consultant

    I have been pioneering solutions in the IAM space for more than 20 years. I have led the developme...

    16.5 Hours Later
+20 Other Responses
Area Icon

Identity And Access Management

My client is a professional services firm who's client is an it service provider, they are looking to speak with a professional who is knowledgeable about the identity and access management (iam) process within the it industry target population: industry former's from any it company such as tcs, infosys, wipro, cognizant, tech mahindra, accenture, capegemini, etc. Specifically, someone who was an operations head or operations manager who can comment on increasing productivity/process improvement/best practices in this space. Someone who has had direct ownership of improving the efficiency and productivity of the iam. Topics of inquiry: 1) what is the benchmark in the industry around number of ftes required to manage x number of ids? 2) how is the iam process run? What are the best practices in order to reduce the number of ftes required to do the job? 3) what kind of activities in this process are automated? What are the best in class off-the-shelf products available to do that? 4) what other practices are being followed to minimize the non-core work being done by the iam ftes (e.G. Reporting, meetings, etc.)? 5) basically, we want to understand how different it service provider do this activity efficiently?

  1. Profile Picture

    Aditya |Owner Employee

    pls call me to discuss...

    41 Minutes Later
  2. Profile Picture

    Shaju |Consulting Director - Manufacturing & Lo

    I know one of the Identity management software providers, which is an enterprise level version and w...

    57 Minutes Later
  3. Profile Picture

    John |Information Security Consultant


    2.7 Hours Later
+4 Other Responses
Area Icon

Ad Cloud Provisioning

We would like to speak with multiple experts who have significant influence over identity and access management. Ideally, a senior security/it executive or have a title/role in security, identity, compliance, identity & access management, it or is. Their company must use azure ad connect sync or azure ad connect cloud provisioning as iam solutions. This would be for a paid 2-hour group workshop and online assignment. Please respond with a few brief answers to the questions below.: 1. Can you share a brief background and your experience in azure ad connect sync or azure ad connect cloud provisioning as iam solutions? 2. What is your level of involvement in the decision-making process over identity and access management? *referrals are highly appreciated.

  1. Profile Picture

    Galaxia |Vice President

    I have experience with AAD connect. I have worked with over 20 clients this year alone with setting ...

    12.1 Hours Later
  2. Profile Picture

    Tammy |Vice President

    Not a fit...

    12.3 Hours Later
  3. Profile Picture

    Michael |Head of Cyber Security

    Can you share a brief background and your experience in Azure AD Connect Sync or Azure AD Connect Cl...

    12.5 Hours Later
+110 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    49 Minutes Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    21.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Digital Identity For Customers

We are a prominent market research firm and an authorized zintro partner. One of our clients, would like to speak with someone knowledgeable about us (and potentially globally) in the emerging field of digital identity for consumers. Specific industries include financial institutions, healthcare, big tech companies like google, facebook, amazon etc. But also open to other industries. High level topics: 1- what is your overall perspective on the digital id space? What are the main actors / forces shaping this space? Where are we right now, and what are the key opportunities / risks? How does this differ by market? 2- how would you see it differently for your industry, in the context of consumers, the companies themselves and capabilities, regulation etc.? interested people please share your relevant experience. Regards, karnika

  1. Profile Picture

    Salvatore |CEO

    By the way here is some prior research on the topic*****...

    2.7 Hours Later
  2. Profile Picture

    Shyam |CFO Advisor

    Have deep expertise on digital identity within Healthcare and can discuss in detail...

    3.1 Hours Later
  3. Profile Picture

    George |Designer

    george moussa. Award winning identity. Affordably. 30 years experience, concept-completion, 3 revis...

    7 Hours Later
+7 Other Responses
Area Icon

Identity And Access Management

Hi, i am looking for experts in identity and access management software market. The following are the important research areas we would like the expert to provide insights on: - iam category overview, modules in the software, important functionalities - key market shifts and technological trends - implementation best practices - sourcing best practices - top suppliers and their capabilities thanks and regards.

  1. Profile Picture

    Ken |Director

    I can perform the research you have requested. I do have a blog post on open source IDAM that you ca...

    1.7 Hours Later
  2. Profile Picture

    Stephane |Vice President - Product

    I have a lot of experience in this area, I was in the industry for 11 years as an executive of an IA...

    4.6 Hours Later
  3. Profile Picture

    Larry |Mainframe Security Analyst

    The request is a little too broad, is there a specific *****h is desired regarding IAM?...

    18.1 Hours Later
+31 Other Responses
Area Icon

Cyberark Enterprise Security

Cyberark enterprise security analyst nyc contract role 6+ months must have: *cyberark *2+ years' experience with identity and access management (iam) *3+ years' experience with password policies project details you will be expanding the use of cyberark throughout the enterprise at my financial services client. It has been up and running for a year.

  1. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I am certifies CyberArk professional. I will be happy to help you depending on the work flexib...

    3.7 Days Later
  2. Profile Picture

    Susan |COO / Managing Partner

    Good afternoon, I represent a team of experts, ITIL / ISO / COBIT certified. If there is openness...

    26.1 Days Later
+3 Other Responses
Area Icon

Single Sign-on And User Management

We are looking to speak to customers of auth0. Auth0 is a cloud service that provides a set of unified apis and tools that instantly enables single sign-on and user management for any application, api or iot device. We are looking for customers preferably in the u.S./canada. The typical titles would be it operations, software engineering, product management, director/vp of security, vp of information security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Ramana |CTO & Chief Architect

    I have the expertise. Please feel free to contact me to discuss further. ...

    2.1 Hours Later
  2. Profile Picture

    Jeremy |Product & Platform Strategy Consultant

    I have worked on APIs and developer ***** over a decade, namely building and leading Box's d...

    2.1 Hours Later
  3. Profile Picture

    Fares |Principal Consultant & Owner

    interested and available...

    19.2 Hours Later
+26 Other Responses
Area Icon

Zero Trust Network Solutions

We are looking for security decision makers either c-level or c-1 (meaning they directly report to the c level exec) are very or extremely knowledgeable about zero trust. The candidates must have significant influence in decisions made at organization for cybersecurity, threat protection, identity management, risk management, application security or digital forensics and incident response this is for a paid 1-hour face-to-face web interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. What level of authority do you have in the purchase and selection of solutions or services related to security and threat protection in your company? 2. How familiar are you with the concept of zero trust?

  1. Profile Picture

    Tim |Director of Security

    I report to the CISO and previously lead security at HealthStream. I have extensive experience in A...

    56 Minutes Later
  2. Profile Picture

    Klint |Chief Information Security Officer, VP T

    Yes, I’m available for this...

    58 Minutes Later
  3. Profile Picture

    Angel |Director Of Information Technology

    As Chief *****cer I have full authority in the purchase and selection of solutions or ser...

    1.1 Hours Later
+197 Other Responses
Area Icon

Customer Identity Management

We are looking to connect with professionals from the customer identity management industry to understand the global market space in a generic way. We are an authorized zintro partner.

  1. Profile Picture

    Anand |Managing Partner

    Practicing IT security consultant. Developed products on Identity management while working in Verizo...

    13 Hours Later
  2. Profile Picture

    Christina |Principal Consultant

    Happy to help. use the ***** many sectors and touchpoints...

    4 Days Later
+3 Other Responses
Area Icon

Online Cybersecurity Education

We are developing a series of undergraduate and graduate level online courses related to cybersecurity for one of our clients in the education space. The goal is to bring their cybersecurity program to a higher level. To achieve that, all courses, whether new or revisions, will be engaging, hands-on, accessible, and utilizing consistent instructional design. Simulations, toolwire labs, and mini hands-on activities will be added to most of the courses; some of the graduate and all undergraduate courses will also be aligned to industry certifications standards. The smes responsibility will be to work with our instructional designers and the college faculty to review/revise existing course outcomes and syllabus, and to either revise or create reading materials list, module notes, assignments and assessment, discussion questions, and interactive components (simulations). Sme qualifications - minimum mater’s level degree, phd preferred - experience teaching (online or in person) or designing similar courses - for certification/exam preparation courses, current certification: o sscp o hcissp o chfi o ceh o escp o security+ o network+ o linux+ - for certification/exam preparation courses, experience teaching or creating exam preparation courses - for certain courses, experience designing practical labs with toolwire scope: scope will depend on a particular course. All courses consist of 8 modules and include: - syllabus - module notes (lecture notes) - discussion questions (1 per module) - assignments - assessments (quizzes and exams) and associated rubrics certification/exam preparation courses will also include development of a practice exam (number of questions depends on the particular certification exam requirements). Some courses will include one or more of the following - simulation - hands-on activity - intensive lab (toolwire) tasks 1. Review existing course materials 2. Provide new content and changes to existing content 3. Review and edit storyboards created by our instructional designers 4. Review completed course in learning management system

  1. Profile Picture

    krag |CISM, CGEIT

    As principal author and SME for ISACA's CISM Review Manual for the past decade, author of several in...

    2 Hours Later
  2. Profile Picture

    Yevgen |Scientific Director

    Hello. We are ready to help. Online training services ( 15 years), so our experts can help you. Dr.E...

    3.2 Hours Later
  3. Profile Picture

    Not |Consultant

    Kevin G. Coleman is a seasoned technology professional with a comprehensive background in technology...

    6.8 Hours Later
+11 Other Responses
Area Icon

It Business Trend

We are looking for multiple c-level or sales executives from north america or continental europe region who can speak of the challenges and opportunities of atos. We are interested to understand the challenges and opportunities of atos and inn which business lines regions are they winning/losing? Why? And to which competitors? This would be for a 1 - hour paid phone consult. Please respond with a few brief statements as to your relevance in this space. 1. Are you able to discuss the challenges and opportunities of atos? 2. Do you have at least 10 years of experience in the industry? 3. Can you share your insights on perspectives on winning/losing projects or market share?

  1. Profile Picture

    Arthur C. |Senior Executive Consultant

    I’ve been getting more than a handful of requests on this very same subject from companies in Europe...

    1.4 Hours Later
  2. Profile Picture

    Sherry |Senior Technical Program Manager

    I'm a former ITSM Program Manager at Atos. I can help on this research as long as it is kept confide...

    1.9 Hours Later
  3. Profile Picture

    Philip |Vice President

    Obviously, the push in the industry now is heavy analytics – ML, AI, and how to gain more insights f...

    2.3 Hours Later
+20 Other Responses
See More Inquiries

Top Forgerock Experts

See More Experts