We performed a comparison between IBM Tivoli Access Manager [EOL] and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out what your peers are saying about SailPoint, One Identity, Omada and others in User Provisioning Software."We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access."
"You can make resources. You can import them from Azure or Active Directory and put them in an application. For example, if there is an application that uses a lot of Active Directory groups, you can make the groups available for people. If they need to access that application, you can tell them the resource groups you have for that application. People can do everything by themselves. They do not need anybody else. They can just go to the Omada portal, and they can do it all by themselves. That is terrific."
"Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want."
"The most valuable aspects of Omada Identity for me are the automation capabilities."
"It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly."
"The most valuable feature in Omada is the governance. We work with other products and other product vendors, but the sweet spot in the market for Omada is where things are heavy on governance."
"he customer success and support teams have been crucial."
"The Governance and self-service that can be set up so you can use them yourself to work in the system are the most valuable features. End users can be enabled to help themselves."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"SAML 2.0."
"The Verify feature: A push method which customers are going for."
"The integration effort with the end application is quite straightforward and easy."
"The product is relatively easier to use than other identity management products."
"It is easy to use, and does not requires an extensive programming or development background."
"I've used it to manage users, create and update, delete users, change passwords, and assign and change rules."
"Using the implementation guide, I was able to implement the solution with ease."
"Streamlines user access, consolidates applications."
"The product’s most valuable feature is flexibility. It can be customized as per the customer’s requirements."
"Connector Xpress and Policy Xpress and the new interface."
"Automated provisioning removes manual labor and manual provisioning."
"I would like to search on date fields, which is not possible now."
"The Omada Identity SaaS version doesn't provide all the features Omada Identity on-premise provides."
"Omada Identity has two main issues that need to be solved or improved the most. One is its setup or installation process because it's complex and cumbersome. I'm talking about the process for on-premises deployment because I've never tried the cloud version of Omada Identity. Setting up the cloud version should be much easier. The second area for improvement in Omada Identity is that it's piggybacking on Microsoft's complex way of having all kinds of add-ons, extensions, or setups, whether small or large, such as the new SQL Server, and it's cumbersome to make sure that everything works. Omada Identity is a complex solution and could still be improved."
"I would like more training. As someone who is new to this world, I don't feel that the courses Omada provides are good enough. They should also improve the documentation. It is difficult to learn how to use the solution by yourself"
"I would like to see them expand the functionality of the tool to continue to be competitive with the monsters out there. For example, they could add functionality on the authentication side, functionality that Octa and SailPoint have. But they should do that while maintaining the same simplicity that makes Omada a product of choice today."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"When the re-certification process is launched that makes Omada very slow. There are performance issues in the current version."
"Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues."
"Multi-factor authentication with social integration needs to improve."
"The self-service portal needs improvement."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"The Identity tool needs to do more kinds of reporting for audit purposes. It doesn't really track any of the metrics that are useful to us, at this point."
"Although the capabilities are there, the user interface needs to be redesigned and the opportunities for integration should be improved."
"There are several areas for improvement in Symantec Identity Governance and Administration. They have no proper documentation on how to do backups. They also have a lengthy workflow process where we have to make some configurations to manage automation in the rules and in our tasks which takes time. We have to manually configure all the configuration files, and we cannot export users because there's no export system in Symantec Identity Governance and Administration. What we'd like to see in the next release of the solution is for them to make configuration and integration with other systems their top priorities. We have many API systems to manage, so hopefully, if they make these enhancements shortly, we can directly connect with our API systems when using Symantec Identity Governance and Administration."
"The product works slowly while accessing cloud-native solutions."
"Identity Manager has a lack of entitlement support, unlike other products that I have worked with."
"It has a large footprint which you'd expect to be much, much smaller. Just to run basic services, we have 10 different servers. Also, if it were easier to manage, that'd be useful."
"The directory has room for improvement. Also, the dashboards and, in particular, the KPI dashboard that shows the current user’s information needs reworking."
"The drawback with the CA Identity Manager is they don't have a connector to HR systems like SAP, or PeopleSoft, or Workday. That's a major drawback with the CA Identity Manager. For that we have to do lots of custom quoting to get data from HR systems. And if they could connect it to GRC systems, that's good to have in an identity product."
More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →
More Symantec Identity Governance and Administration Pricing and Cost Advice →
Earn 20 points
IBM Tivoli Access Manager [EOL] doesn't meet the minimum requirements to be ranked in User Provisioning Software while Symantec Identity Governance and Administration is ranked 9th in User Provisioning Software with 6 reviews. IBM Tivoli Access Manager [EOL] is rated 8.0, while Symantec Identity Governance and Administration is rated 7.6. On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Has a simple GUI and is easy to deploy, but has no proper documentation on how to do backups, and has lengthy configurations and workflows". IBM Tivoli Access Manager [EOL] is most compared with , whereas Symantec Identity Governance and Administration is most compared with SailPoint IdentityIQ, AlertEnterprise Enterprise Guardian, SAP Identity Management, Microsoft Identity Manager and BeyondTrust Endpoint Privilege Management.
See our list of best User Provisioning Software vendors and best Identity Management (IM) vendors.
We monitor all User Provisioning Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.