We performed a comparison between SailPoint IdentityIQ and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out in this report how the two User Provisioning Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Omada is its API connectivity, which allows seamless integration with various services like SAP, GRC, and Microsoft licenses."
"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."
"The best feature in Omada Identity is that it enables us to implement standardized employee life cycle processes so that we don't have to create them ourselves. We can then use the standard workflows. The breadth and scope of the solution’s IGA features also fulfill our requirements."
"The teams we work with at Omada provide great insights and support. Overall, it has been a pleasure working with them. That's the part we value the most."
"The benefits of Omada Identity include a holistic way of viewing access, the ability to give people access, and automation."
"Omada's user interface is elegant and easy to work with. I like Omada's ability to automatically generate accounts for new hires and allow them access to all required systems by established policies. Around 80 percent of workers can start working immediately on their first day without requesting further access."
"The identity lifecycle support is definitely valuable because we are a complex organization, and there is a lot of onboarding, movement, and offboarding in our organization. We have 31,000 users, and there are a lot of users who are constantly onboarding, offboarding, and moving. So, we need to make sure that these activities are supported. In old times, we used to do everything manually. Everyone was onboarded, offboarded, or moved manually. So, from a business point of view and an economics point of view, identity lifecycle is most valuable. From a security point of view, access review is the most important feature for us."
"I appreciate all the support we receive from Omada."
"The level of customization for data imports and role modeling, because it helps to integrate faster, support easier and let it reuse the organization role structure."
"Deployment takes a bit of time, however, once it's done properly, everything becomes very organized and easy to use."
"The tool is quite stable and user-friendly."
"It is a scalable product."
"We like the integration with other systems."
"The solution is one of the main security products you need to control access and have visibility into what's happening in your organization. It helps with managing access to applications, ensuring governance, and obtaining certifications."
"This solution has improved our organization through its ease of application onboarding, approvals, provisioning, and lifecycle UI performance."
"The solution is very good at the management of the identity lifecycle."
"It offers a nice price. It's mid-range."
"Connector Xpress and Policy Xpress and the new interface."
"There are many valuable features within the solution. The product is easy to customize. It’s also highly secure."
"The solution is easy to scale."
"Provisioning engine (on the back-end, separate from front-end components, that's part of layered architecture)."
"The most valuable features are role-based access and identity provisioning, which allow a single point of user access to multiple places."
"Out-of-the-box the product has a lot of opportunity for configuration and sophisticated identity management capability."
"Word mining and risk campaigns are the most valuable features of this solution."
"The backend is pretty good but the self-service request access screen, the GUI, needs improvement. It's an old-fashioned screen. Also, Omada has reports, but I wouldn't dare show them to the business because they look like they're from 1995. I know they are working on these things and that’s good, because they’re really needed."
"There's a challenge with handling large amounts of data in this system."
"There is room for improvement in Omada's integration capabilities, particularly in streamlining complex integrations and enhancing programming logic for better rule management."
"One thing that we are not so happy about is the user interface. It is a bit dated. I know that they are working on that, but the user interface is quite dated. Currently, it is a little bit difficult to customize the user interface to the need of the business, which is a little bit disappointing. It needs it to be a little bit easier to operate, and it should have a better user interface."
"When making a process, you should be able to use some coding to do some advanced calculations. The calculations you can currently do are too basic. I would also like some additional script features."
"Improved traceability would be helpful for administrators. For example, let's say a user's permission is being revoked. We can only see the system that has carried out a particular action but not what triggered it. If an event definition or something has changed in the criteria for the permission being removed or something like that, we don't have immediate access to that information. It takes a little detective work."
"Omada could communicate better with us about the product roadmap. We haven't gotten any updates about it. The user interface is often a bit difficult to understand. It isn't optimized for small screens, so it doesn't display all of the information clearly, so users need to scroll a lot."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"The product has poor reporting and analytic capabilities. Reports are not easy to use and its analytic capabilities are limited."
"There's a lot of customization required to improve the user experience."
"Additional details during account aggregation failures to help quick troubleshooting."
"They can work on their strategy for the on-premise version. They have to decide whether and for how long they will support the on-premise version. The new features first appear in the cloud, and after that, they are released for the on-premise version. In the cloud, you have more options and flexibility, which is absolutely normal. They have to have a clear strategy regarding whether they'll support the on-premises version with the same focus. The licensing for on-premise and cloud is a little bit different. They can make it the same."
"The price of IdentityIQ could be lower. There are additional costs when you buy the licenses, and they force the customers to pay for them."
"The report functionality and dashboard of the access manager could be improved."
"Some setups should be done in the interface and in the code, and could be made simpler."
"Certifications could include additional access levels or practices."
"Symantec is only on-premises, not on the cloud."
"In the next release, there should be provisioning of your certifications."
"Identity Manager has a lack of entitlement support, unlike other products that I have worked with."
"A better information display for the approvals within the workflow would give them more information and the ability to comment back on a request as to why they're rejecting it. We've been telling them we'd like this improvement, and we hope to see it."
"There are times that it takes too long to generate reports and to run the assessment tools to collect the information."
"Although the capabilities are there, the user interface needs to be redesigned and the opportunities for integration should be improved."
"They provide a framework to develop your own connectors. A connector is a piece of software that integrates with the solutions that are not a part of the support matrix. Currently, it is difficult to create these connectors in this solution. Other solutions, such as NetIQ Identity, provide a better way to create your own connector. Currently, there is no cloud version. It should have a cloud version."
"The development process to create this connector is not as easy as I would like."
More Symantec Identity Governance and Administration Pricing and Cost Advice →
SailPoint IdentityIQ is ranked 1st in User Provisioning Software with 61 reviews while Symantec Identity Governance and Administration is ranked 9th in User Provisioning Software with 65 reviews. SailPoint IdentityIQ is rated 8.2, while Symantec Identity Governance and Administration is rated 7.6. The top reviewer of SailPoint IdentityIQ writes "Flexible, easy to customize, and not too difficult to set up". On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Works well on-premises and has partial capabilities but lacks many feaures". SailPoint IdentityIQ is most compared with Saviynt, Microsoft Entra ID, One Identity Manager, ForgeRock and Oracle Identity Governance, whereas Symantec Identity Governance and Administration is most compared with AlertEnterprise Enterprise Guardian, Microsoft Identity Manager, SAP Identity Management, BeyondTrust Endpoint Privilege Management and OpenIAM Identity Governance. See our SailPoint IdentityIQ vs. Symantec Identity Governance and Administration report.
See our list of best User Provisioning Software vendors and best Identity Management (IM) vendors.
We monitor all User Provisioning Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
I checked with a colleague who has more “hands-on” experience, here is his response:
If so CA IDM please no. They have done some work but it’s still not good performance-wise. It has been updated from the original netegrity or whatever code (as of a couple of years the scripts still had that in the header comments, as in untouched in years after purchase). I am not saying SailPoint is the cat's meow, as I don’t know. But given my experiences with CA IDM, and its use internally. It’s complex, does a lot but doesn’t perform very well. At one time there was an issue with data integrity due to the replication cycle (2 repositories, user/id, and a replication repository just for that and data are flushed through both in sequence) as in the last change to data was not necessarily applied in sequence. Results were last change was not the attribute state. Surely that has been fixed by now but with CA you never know. And that’s another issue. My experiences with CA support pretty much got the right support engineer, you get real answers. The wrong one, not so much. If I was starting from scratch I might well consider OpenAM. The commercial product I am pretty sure but a great IAM swiss army knife. It’s descended from Sun One which oracle tossed out when they bought sun over their own IAM product.
When you say "differences" are you looking at a feature-by-feature comparison or at an overall level - the various "-abilities" like implement-ability, integrate-ability, support-ability, afford-ability and so on?