We performed a comparison between SailPoint IdentityIQ and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out in this report how the two Identity Management (IM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The support response time and the freedom from strange bugs and strange things happening in the software are valuable."
"It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly."
"The customer success and support teams have been crucial."
"Two valuable features of Omada Identity are the ability to discover accounts and link them to identities, and the automatic disabling of inactive accounts or identities."
"I appreciate all the support we receive from Omada."
"The teams we work with at Omada provide great insights and support. Overall, it has been a pleasure working with them. That's the part we value the most."
"We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access."
"User-friendly solution."
"The support is very good."
"User provisioning and the role management features are good."
"It is a scalable product."
"What I like most about SailPoint IdentityIQ is that it's simple to use and easy to configure and deploy."
"It provides a lot of out-of-the-box functionalities. You don't have to do too much custom development like other solutions such as Microsoft or NetIQ. It also has a lot of out-of-the-box connectors for different sources, directories, databases, etc. Its cloud version is working very well, and its pricing is okay. Its value for money is fine for most of the customers. It is also very flexible. They have frequent new releases and patches for fixing errors and things like that."
"The compliance features are the most valuable features."
"The solution is very good at the management of the identity lifecycle."
"Deployment takes a bit of time, however, once it's done properly, everything becomes very organized and easy to use."
"I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so."
"I've used it to manage users, create and update, delete users, change passwords, and assign and change rules."
"Connector Xpress and Policy Xpress and the new interface."
"It is easy to use, and does not requires an extensive programming or development background."
"Out-of-the-box the product has a lot of opportunity for configuration and sophisticated identity management capability."
"The scalability potential is there if a company needs to expand."
"It has good endpoint support and endpoint connectivity to different versioning endpoints."
"It has improved our user management. It is definitely streamlined."
"One thing that we are not so happy about is the user interface. It is a bit dated. I know that they are working on that, but the user interface is quite dated. Currently, it is a little bit difficult to customize the user interface to the need of the business, which is a little bit disappointing. It needs it to be a little bit easier to operate, and it should have a better user interface."
"Improved traceability would be helpful for administrators. For example, let's say a user's permission is being revoked. We can only see the system that has carried out a particular action but not what triggered it. If an event definition or something has changed in the criteria for the permission being removed or something like that, we don't have immediate access to that information. It takes a little detective work."
"The comprehensiveness of Omada's out-of-the-box connectors for the applications we use could be better. We are getting a new HR system called Cornerstone for which they do not have an out-of-the-box connector, so we have to take the REST connector and play around with it."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"The account management integration isn't bad, but it isn't plug-and-play like Microsoft Azure. You need some deep development knowledge to set up the connectors."
"The Omada support response time has room for improvement."
"Omada's performance could be better because we had some latency issues. Still, it's difficult to say how much of that is due to Omada versus the resources used by our other vendors in our on-prem environment. Considering the resources we have invested into making it run well, it's slightly slower than we would expect."
"The backend is pretty good but the self-service request access screen, the GUI, needs improvement. It's an old-fashioned screen. Also, Omada has reports, but I wouldn't dare show them to the business because they look like they're from 1995. I know they are working on these things and that’s good, because they’re really needed."
"The cost can be prohibitive for middle-tier companies."
"It is too technical. You need really good technical skills in Java and other technologies, which are hard to find. If they can make it easier so that things can be done with a few clicks, it will be great."
"What it doesn't do is provide notice in the event of a vulnerability or offense from the security."
"The cost of this solution is high. The technical assistance center could be improved. They're very good, but considering the intricacies of the solution, they can further improve."
"The solution's technical support team's response time and skills need improvement since it is an area where there are shortcomings."
"Competitors are advancing by offering integrated solutions encompassing access and privileged access management in a single unified platform. IdentityIQ's focus has remained primarily on identity and access governance, neglecting to expand its offerings to include these additional functionalities within its existing product. Enhancing their product by incorporating modules for access management, privileged access management, and third-party access governance could address this gap."
"The interface should be simple and easier to use."
"There are various functions that don't work in IdentityIQ, including the access request reminder, which doesn't go to the approvals in the proper format, so it's hard for users to read."
"The drawback with the CA Identity Manager is they don't have a connector to HR systems like SAP, or PeopleSoft, or Workday. That's a major drawback with the CA Identity Manager. For that we have to do lots of custom quoting to get data from HR systems. And if they could connect it to GRC systems, that's good to have in an identity product."
"In the next release, there should be provisioning of your certifications."
"The solution is not the best or the fastest available."
"Although the capabilities are there, the user interface needs to be redesigned and the opportunities for integration should be improved."
"It has a large footprint which you'd expect to be much, much smaller. Just to run basic services, we have 10 different servers. Also, if it were easier to manage, that'd be useful."
"We would like to see integration with analytics. Also, for them to be more efficient regarding discovering and implementing new rules."
"The product works slowly while accessing cloud-native solutions."
"There are times that it takes too long to generate reports and to run the assessment tools to collect the information."
More Symantec Identity Governance and Administration Pricing and Cost Advice →
SailPoint IdentityIQ is ranked 2nd in Identity Management (IM) with 61 reviews while Symantec Identity Governance and Administration is ranked 20th in Identity Management (IM) with 65 reviews. SailPoint IdentityIQ is rated 8.2, while Symantec Identity Governance and Administration is rated 7.6. The top reviewer of SailPoint IdentityIQ writes "Flexible, easy to customize, and not too difficult to set up". On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Works well on-premises and has partial capabilities but lacks many feaures". SailPoint IdentityIQ is most compared with Saviynt, One Identity Manager, Microsoft Entra ID, ForgeRock and Oracle Identity Governance, whereas Symantec Identity Governance and Administration is most compared with AlertEnterprise Enterprise Guardian, SAP Identity Management, Microsoft Identity Manager, Cisco ISE (Identity Services Engine) and BeyondTrust Endpoint Privilege Management. See our SailPoint IdentityIQ vs. Symantec Identity Governance and Administration report.
See our list of best Identity Management (IM) vendors and best User Provisioning Software vendors.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
I checked with a colleague who has more “hands-on” experience, here is his response:
If so CA IDM please no. They have done some work but it’s still not good performance-wise. It has been updated from the original netegrity or whatever code (as of a couple of years the scripts still had that in the header comments, as in untouched in years after purchase). I am not saying SailPoint is the cat's meow, as I don’t know. But given my experiences with CA IDM, and its use internally. It’s complex, does a lot but doesn’t perform very well. At one time there was an issue with data integrity due to the replication cycle (2 repositories, user/id, and a replication repository just for that and data are flushed through both in sequence) as in the last change to data was not necessarily applied in sequence. Results were last change was not the attribute state. Surely that has been fixed by now but with CA you never know. And that’s another issue. My experiences with CA support pretty much got the right support engineer, you get real answers. The wrong one, not so much. If I was starting from scratch I might well consider OpenAM. The commercial product I am pretty sure but a great IAM swiss army knife. It’s descended from Sun One which oracle tossed out when they bought sun over their own IAM product.
When you say "differences" are you looking at a feature-by-feature comparison or at an overall level - the various "-abilities" like implement-ability, integrate-ability, support-ability, afford-ability and so on?