Optimal IdM, LLC. is a leading global provider of enterprise identity management software solutions and services. Headquartered in the Tampa Bay area of Florida, the Optimal Difference™ from Optimal IdM provides sales and services through regional offices across the United States and a growing network of resellers and distributors.   Optimal IdM´s customers include Fortune 1000 companies, as well as Federal, State and Local Government agencies all over the world. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception. LEARN MORE ABOUT US

  • We guarantee 100% customer satisfaction We partner with our customers to deliver a complete IAM authentication service and identity management solution.
  • We deliver value quickly Working as a team, we quickly add value to your organization. In most cases, our enterprise-level cloud identity and access management products will have an initial deployment phase of 90 days or less.
  • We ensure successful deployments In the world of identity and access management systems, successful product deployments are the ultimate measure of success. At Optimal IdM, we get our clients to production seamlessly.
  • We strive for 100% Customer references Optimal IdM´s goal is for every client to be a positive reference.


Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM
Optimal IdM

“We cannot be more pleased with our overall experience with Optimal IdM. They truly go above and beyond to make sure that all of our needs are met from sales, implementation, professional services, billing, to support. I wish more vendors were as customer oriented as Optimal IdM.”

Identity & Access Management Manager | Anonymous Services Corporation

“Our experience has been very positive. The [Optimal IdM] solution provides a very easy to understand user interface for two factor authentication. Optimal IDM has been very responsive and has quickly implemented any needed changes. Support has quickly addressed any issues that have arisen and there have been very few.”

IAM Engineering Team Manager | Anonymous Construction Firm

“We are pleased that federation between VIS for Office 365 and Microsoft 365 has been verified and found to be inter-operable so that our customers can take advantage of this solution.”

Vijay Kumar | Microsoft

“The overall experience had been great with a solution fit-for-purpose meeting our organization needs with prompt vendor participation at each milestone.”

Business Systems Specialist | Anonymous Government Agency

“I want to take a moment to say thank you! The Optimal IDM team have been great partners with Sears Hometown and Outlet Stores as best demonstrated recently by your introduction to us of TypingDNA, biometric/behavioral, authentication method. With its recent implementation we now have all of our users on multi-factor authentication and were able to do so without inhibiting the user experience. Our users can simply type their email and password and sign in with the TypingDNA authentication occurring in the background transparent to them. Only real change for some of them is using their email instead of their username to login. As an organization, we are benefiting from a higher degree of security while maintaining a great user experience!”

Phil Beaudoin | Sears Hometown Outlet stores, Inc.

“The Optimal People Picker is simply incredible! It provides us with an intuitive and efficient method to allow SharePoint users to find users and groups they are entitled to see, while ensuring they do not have the ability to openly browse our corporate Directories.

Simply put, we decide what the People Picker exposes and not the tool. This is critical in an enterprise environment that includes employees, partners, and customers.

In short, with the Optimal People Picker, we have a better user interface, enhanced security, and increased productivity packaged in a single product.”

Gregg Fabbri | PTC Web Systems

Each day millions of users worldwide depend on Optimal IdM´s identity management solutions for their security, compliance and identity management needs.

With solutions deployed on six continents, our customers include Fortune 1000 organizations covering a broad range of business verticals, as well as federal, state and local governments. We partner with our customers and become an extension of their staff and team as their on-premise or cloud identity service provider. We are 100% committed to our clients and are extremely proud of our joint successes. In short, our clients are our business.

Latest Updates

September 13, 2019

Using Context-Based Authentication and Authorization to Minimize Risk

One of the most exciting advances in identity protection today is context-based authentication and authorization. You may also hear it called “adaptive” authentication and authorization. Context-based access uses analytic data that an identity platform compiles as part of the authorization and authentication process to improve authentication methods. These analytic-enhanced authentication methods should be even more effective at enhancing consumer safety and reducing online fraud. ... Read More

September 13, 2019

Authentication 101: Your Basic Guide to Authentication

password-authentication Do you know what Adobe, Apple, Sony, Yahoo and Twitter have in common? Hint: Yes, they are mega-companies making hundreds of millions of dollars annually, but that’s not it. Answer: They’ve all been hacked by cybercriminals who breached passwords. That’s right — passwords. How do they do it? How do hackers guess passwords containing uppercase letters, lowercase letters, numbers and symbols? Do they spend their every waking moment trying out new combinations? Are they psychic? It’s actually easy for expert hackers to guess passwords, especially if they are weak passwords such as “12345” or “letmein.” To breach stronger passwords, hackers use password “crackers,” or software that repeatedly creates millions of letter/number/symbol combinations until the correct password is found. One type of password attack is the “dictionary” attack. The other is a “brute force” attack. Dictionary attacks use software that scans huge word files until the correct password is detected. Brute force attacks scan lists of virtually every possible password character. Although brute force attacks may take ten times as long as a dictionary attack, it’s inevitable that targeted password authentication processes will be thoroughly breached. ... Read More

Optimal Events

March 04, 2019 - March 08, 2019

RSA Conference 2019

747 Howard Street
San Francisco , California

June 24, 2018 - June 27, 2018


900 Boylston Street
Boston, MA 02115

April 16, 2018 12:00 am - April 20, 2018 12:00 am

RSA Conference

747 Howard Street
San Francisco, California 94103

March 19, 2018 12:00 am - March 21, 2018 12:00 am

InfoSec World

4600 North World Drive
Orlando, FL 32830

November 28, 2017 - November 30, 2017

Gartner IAM Summit

3570 Las Vegas Blvd. South
Las Vegas, Nevada 89109

September 25, 2017 - September 29, 2017

Microsoft Ignite

Orlando, Florida

February 13, 2017 - February 17, 2017

RSA Conference 2017

747 Howard Street
San Francisco, CA 94103