We performed a comparison between Microsoft Entra ID and Symantec VIP Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is the single sign-on, which allows any application that is SAML or OAuth compatible to use Azure as an identity provider for seamless sign-in."
"Being able to use Azure AD means that you can use some of the Azure AD security features like Advanced Password Protection. As well as querying your normal password requirements like lengths and complexity, Azure AD has a feature in which you can put specific words. It can be words to do with your company, words to do with your company location, or words that a lot of your employees would otherwise use. You can disallow them. It's very good at making more obvious passwords, ones they're not allowed to use anymore. That's a good feature."
"Privileged Identity Management and Privileged Identity Management make controlling access considerably easier and ensure that authorized access is achieved."
"I would say that Azure AD's pricing is very reasonable because of the structure and in terms of the solution."
"Being able to easily authenticate yourself on the MSA app is valuable. It is easy to use. Rather than receiving a code in an SMS, you can just verify that it is you. You don't have to punch in any password or any six-digit code. That's the feature that I like the most."
"Two very important features in terms of security are governance and compliance through the Conditional Access policies and Azure Log Analytics."
"It enhanced our end user experience quite a bit. Instead of the days of having to contact the service desk with challenges for choosing their password, users can go in and do it themselves locally, regardless of where they are in the world. This has certainly made it a better experience accessing their applications. Previously, a lot of times, they had to remember multiple usernames and passwords for different systems. This solution brings it all together, using a single sign-on experience."
"Many of its features are valuable, including: facilitating application authentication, privileged access management, processes for attestation, and access reviews."
"The tool has been very stable, in my experience. Also, I haven't faced any issues or problems with integration or connectivity."
"The two-factor authentication is most definitely valuable and moves us closer to being able to check off those important boxes for compliance."
"The VPN we are using is good and working quite well."
"In this version 9.1, lots of changes are done for the dashboard, User Store etc."
"Other than it provides us with remote access, so it's fairly easy to install, fairly easy to set up, and provides us the ability to get into our corporate environment."
"The product is useful for providing user access from an in-built office server as we follow the work-from-home model."
"It's a good tool. It's pretty straightforward."
"Cloud-based service and management."
"The solution has not saved costs. While we’ve eliminated some tools, there are some other features that we are dependent on as admin, which are not yet integrated with Azure AD."
"The onboarding process for new users can be improved. It can be made simpler for people who have never registered to Azure AD previously and need to create an account and enable the MFA. The initial setup can be made simpler for non-IT people. It should be a bit simpler to use. Unless you get certifications, such as AZ-300 and AZ-301, it is not a simple thing to use at the enterprise scale."
"Allowing for more customization would be very useful. There is a limited metadata capability. When you look at a user, there are only six pieces of information you can see, but organizations are way more complex, so having that metadata available and being able to use that for dynamic user groups and other policies would be very helpful."
"We previously used Microsoft's technical support, which was excellent; they were very responsive. Now, we use a CSP, and their support is lacking, so I rate them five out of ten."
"To look at more documentation, engineering, or an open standard would be nice."
"A couple of years ago, I experienced some difficulty in implementing the solutions, the services of Azure AD. In one instance, I was not able to configure Azure AD for a registration. This was two or three years ago. However, currently, the documentation is very clear and there are no loopholes or anything that could hinder even a simple IT administrator to implement these services."
"We have a custom solution now running to tie all those Azure ADs together. We use the B2B functionality for that. Improvements are already on the roadmap for Azure AD in that area. I think they will make it easier to work together between two different tenants in Azure AD, because normally one tenant is a security boundary. For example, company one has a tenant and company two has a tenant, and then you can do B2B collaboration between those, but it is still quite limited. For our use case, it is enough currently. However, if we want to extend the collaboration even further, then we need an easier way to collaborate between two tenants, but I think that is already on the roadmap of Azure AD anyway."
"My only pain point in this solution is creating group membership for devices."
"Maybe Symantec could consider providing a step-by-step guide for first-time users."
"In the next release, I would like the ability to work offline with remote access."
"I would like to see the solution meet the integration needs at our company...Improving the solution's integration feature would be beneficial."
"The User Store synchronization part needs to improve. Also, the logs, reports, and dashboard can be improved."
"It gets out of sync with Active Directory or whatever it might be, whatever the authentication piece is on Active Directory, and they just reset it on the backend. I never have to contact the vendor."
"It is challenging to use when installing a new version."
"The gateway server is a RADIUS server, but it lacks the functionality of returning RADIUS attributes other than those that are required for the gateway to authenticate the users."
"Geofencing needs improvement."
Microsoft Entra ID is ranked 1st in Authentication Systems with 190 reviews while Symantec VIP Access Manager is ranked 14th in Authentication Systems with 15 reviews. Microsoft Entra ID is rated 8.6, while Symantec VIP Access Manager is rated 8.4. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Symantec VIP Access Manager writes "With its mobile application, this tool offers a convenient and user-friendly experience to its users". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Okta Workforce Identity and Cisco Duo, whereas Symantec VIP Access Manager is most compared with Check Point Remote Access VPN, Yubico YubiKey, Q-Bot, RSA SecurID and Okta Workforce Identity. See our Microsoft Entra ID vs. Symantec VIP Access Manager report.
See our list of best Authentication Systems vendors and best Access Management vendors.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.