Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
278,683 professionals have used our research since 2012.
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
278,683 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

What is Identity and Access Management (IAM)?

When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.


Comparison of The Best Identity Management Tools & Vendors

Read reviews of Identity and Access Management (IAM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Real User
Cyber Security Engineer at a recruiting/HR firm with 51-200 employees
Jan 24 2017

What is most valuable?

Randomizing local accounts on all endpoints * ERPM's greatest ability is that it can easily randomize ALL local accounts on almost any endpoint. One of biggest security risks that occur within a company is the ability of an attacker to... more»

How has it helped my organization?

* RDP * Admin Checkouts * Removing hard-coded credentials from most of our built-in Apps

What needs improvement?

One of the features that ERPM is capable of providing is giving users the ability to 'request' admin credentials on their machines for a specific purpose (provided you have removed all users from local admin on their machines). You can force... more»
Consultant
Security Manager at a tech services company with 10,001+ employees
Aug 20 2017

What is most valuable?

The best part of Oracle Identity Manager is how well it will align to the business. There are features that are more generally required by business and you can easily get them with Oracle Identity Manager. If you compare it with Azure, with... more»

How has it helped my organization?

When I joined my project, they had been using a meta directory for identity management and application provisioning. There were around 150,000 active accounts, out of which many were redundant. They had left the organization 10 years ago.... more»

What needs improvement?

One thing is the size of the infrastructure that is required for Oracle to implement. In addition, the maintenance cost and pricing. With an Oracle implementation, we need to have a high availability of infrastructure where you need a minimum... more»
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
278,683 professionals have used our research since 2012.
Reseller
Information Security & PreSales Officer at a tech services company with 51-200 employees
Aug 30 2016

What is most valuable?

The main areas of focus of BeyondTrust products is Privileged Access Management. Along with it, they've also bundled the PAM solutions with a Vulnerability Management solution. We all know Retina Network Security Scanner has been around for... more»

How has it helped my organization?

We implemented the BeyondTrust suite of products as part of our initial evaluation and continued to use the product because we liked it very much. We distribute security solutions to our customers, so we can only sell something to our... more»

What needs improvement?

I'm of the thought that the best products in the market have room for improvement, always, and so is the case with this product as well. I have always submitted the improvements / bugs list to the vendor and am looking forward for them to be... more»
Real User
Senior Identity and Access Management Specialist at a tech vendor with 1,001-5,000 employees
Jan 15 2017

What is most valuable?

* The GUI is very impressive and clean (even cleaner and minimalistic in v7). * JobQueueInfo does an amazing job tracking all processes. * Synchronizations are easy to set up. * Reporting capabilities are fantastic once you get the hang of... more»

How has it helped my organization?

* Auditing becomes easier from an admin perspective. * There is more control over everything. * Processes are much better defined. * People tend to take some functional roles much more seriously. There were some roles that were very old in... more»

What needs improvement?

* DBQueue processes can bottleneck the system at times. In v7, its apparently re-architectured, and is better. There can be too many of them and they process very slowly, causing actual processes to take a lot more time to complete. * There... more»
CA Technologies
Real User
Engineering Lead at SunTrust Banks, Inc.
Jan 14 2018

What is most valuable?

Before I used CA Identity Suite, it was a separately installed component, nowadays offered as a Virtual Appliance, and that saves considerable time for installing and controlling it. Deployment Express saves time for modifications and things... more»

How has it helped my organization?

With the Virtual Appliance, combined with CA Identity Manager and GovernanceMinder as one solution, it eliminates having multiple infrastructure requirements, multiple products, and gives a holistic view of access granting.

What needs improvement?

I really haven't thought about features for that next release because it is addressing all of our needs right now. I would say, there is one. If there was a seamless integration between portal and IdentityMinder, then that would help a bit,... more»
Real User
Consultant at a tech company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
tools4ever
Real User
Chief Technology Officer at a tech services company with 51-200 employees
Aug 09 2017

What is most valuable?

* The visual interface of the scripting * The fact that you don't need to be an actual developer to be able to use the product * Logging, automation, and scheduling, as well as the capability to script via COM objects to create front end web... more»

How has it helped my organization?

Before using UMRA, the creation of users at a School District with 34,000 students used to take approximately three to four weeks to implement using LDIF imports via batch files. Then, after implementing UMRA, all user creations got... more»

What needs improvement?

The UMRA Forms of the product is fantastic, especially for those who do not have the expertise to create the web front ends using COM automation. The problem is that the company may be concentrating on creating something other than the Forms... more»
Consultant
SAP consultant at a tech services company
Aug 23 2017

What is most valuable?

I like the core functionality of what IBM provides, like provisioning the triggers. Also, how you can maintain not only SAP back end systems, but non-SAP. The functionality that IBM provides if you're able to implement a certain logic, and if... more»

How has it helped my organization?

In my company, we don't use IBM. I'm just implementing IBM in other companies.

What needs improvement?

The current functionality allows you only to change one user at a time. There is no option to maintain the business roles from the UI using like standard validation, imports, or whatever you have to build your business roles one by one.... more»
Real User
Security Expert at SecurIT
Sep 13 2016

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
Real User
Cloud Support Engineer at a tech services company with 10,001+ employees
Jun 28 2017

What is most valuable?

Automation of access provisioning, maintenance, and de-provisioning based on HR employment status. The ability to add in different applications for proper lifecycle management was critical to a successful and streamlined business operation.... more»

How has it helped my organization?

It reduced manual effort for on/off-boarding staff and removed need for manual password management of some critical systems.

What needs improvement?

This is based off using Account Courier and Password Courier exclusively, and may not be indicative of more recent features included in the platform. The entire provisioning and management process needed to be driven by manually developed... more»
Real User
Infrastructure Specialist at a financial services firm with 5,001-10,000 employees
Jul 17 2017

What is most valuable?

Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites. These are heavily customizable and can fully integrate with in-house provisioning systems.

How has it helped my organization?

Allows users to use a single password across a set of multi-tenant application suites. This would have otherwise required 50-100 unique passwords per application. This allows the user to inject a centralized password (a.k.a. authentication... more»

What needs improvement?

The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available. The majority of the "IMS profiles" we use are too dangerous to... more»
Consultant
Cyber Security Consultant at a tech services company with 1,001-5,000 employees
Feb 14 2017

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees
Sep 25 2016

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
Real User
Solution Architect Lead at a insurance company with 1,001-5,000 employees
Sep 01 2016

What is most valuable?

WebSEAL is a reverse proxy web server that performs authentication and authorizations. It is similar to CA SiteMinder Secure Proxy Server. The advantage of WebSEAL is that WebSEAL supports SPNEGO protocol and Kerberos authentication to... more»

How has it helped my organization?

The combination of TAM with IDM in IBM Tivoli Identity Manager helped us to realize robust and secure authentication infrastructure in accordance with industry regulations and laws. * Providing centralized authentication authority and enforce... more»

What needs improvement?

Due to a constraint of the built-in browser in a Handy phone (called NTT i-Mode), the former version of TAM could not be used in the Japan market. The issue was resolved by the decline of Japan-specific Handy phones. Cookies were not... more»
Real User
Managing Director at a tech services company with 51-200 employees
Aug 27 2017

What is most valuable?

* Role Based Access Control * Provisioning, Re-provisioning, De-provisioning and Undo-De-provisioning policies * Data validation policies * Workflows * If Then Else statements * Approval Workflows * Schedule Workflows * Escalation * Virtual... more»

How has it helped my organization?

* Heavily Automates - it will automate the entire provisioning, re-provisioning, de-provisioning and undo-de-provisioning tasks * Complete Audit Trail - it gives an audit trail for each and every activity * Increase in accountability –... more»

What needs improvement?

* Web console – it should have more customization options in terms of look and feel of the landing page * Workflow policies – Additional policies for folder access provisioning * Bring back attestation – Attestation feature is dropped from... more»
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees
Sep 11 2016

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
Real User
Enterprise Access Manager at a financial services firm with 1,001-5,000 employees
Nov 27 2016

What is most valuable?

The most valuable feature is that it provides a consistent user interface. That's the primary thing, the consistent user interface.

How has it helped my organization?

Over time, it will improve the way my organization functions. We've had some challenges as far as rolling it out, but that's the goal. We have a consistent set of processes, so we need a consistent toolset to be able to disperse across our... more»

What needs improvement?

One of the things they don't have is, they don't provide support for what are called service accounts, non-human accounts, non-human IDs. That's critical. In addition to that, we have some role mining capabilities that Oracle really hasn't... more»
CA Technologies
Real User
Security Manager & CM Specialist at a tech services company with 51-200 employees
Apr 30 2018

What is most valuable?

* Identifies, debugs and models the privileges of your organization, adapting it to business strategies. * Helps discover roles based on available patterns. * Enables review campaigns to certify user privileges, roles and resources,... more»

How has it helped my organization?

In the processes where we need to analyze data, IG has enabled and facilitated the analysis of privileges, generation of roles to cover RBAC and integrate with the solution of Identity Manager, as well as the compliance aspect by the... more»

What needs improvement?

The administrative part is not very intuitive. Actually I think it is because it requires specialization and knowledge in what is done. I found an option to import specific information, but the functionality was non-existent so they have to... more»
CA Technologies
Real User
Senior Director at a energy/utilities company with 1,001-5,000 employees
Dec 16 2016

What is most valuable?

We have used CA's security stack. We have used CA Identity Manager, CA SSO, CA Privileged Access Manager Server Control, CA Identity Governance and CA Strong Authentication. The total integration of the product was very beneficial for us.... more»

How has it helped my organization?

CA Identity Suite has been extremely helpful for us from the user onboarding/offboarding. We are a company where SOX/PCI, other regulatory compliance is very important to us. It kept us honest from the standpoint of meeting the regulatory... more»

What needs improvement?

The key feature I would like to see is close loop remediation, which is in conjunction with CA Identity Governance today. That will be one of the key features, including the mobility features on password self-service, which will be another... more»
Real User
Senior Software Engineer at a retailer with 10,001+ employees
Jan 08 2018

What is most valuable?

As a company, the most valuable feature that we have is our almost real-time feed from our HR systems into CA Identity Manager, which then feeds down to all of our directories or applications that an employee could potentially need to access.

How has it helped my organization?

The multitude of end-points that we can connect to, whether it is an out-of-the-box connector or through a JNDI or a JDBC connection. We can connect to just about every application that we so far have tried to connect to with relative ease.

What needs improvement?

One of the biggest features that we are looking at is more cloud-based options. Right now, there is a connector to Office 365. While it is okay for smaller companies like us, as a 300K plus operation, it is not really quite where it needs to... more»
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
278,683 professionals have used our research since 2012.

Identity and Access Management (IAM) Articles

Content and Community Manager
IT Central Station
What do our users think about their Identity and Access Management tools? What do users discuss in their identity and access management reviews in 2017? What have their experiences been this year? In the excerpts below, users discuss valuable features and room for improvement for the following... more»
Content and Community Manager
IT Central Station
What do IT Central Station community members say about the user provisioning software that they use? What do IT Central Station community members from larger enterprise companies say about the user provisioning software that they use? How does Oracle Identity Manager differ from CyberArk... more»
Berkley LambThis article doesn't make sense. these are two different tools with two... more»
204
Operations Engineering Manager
Technology Architect with over 16 Years of IT experience in software Industry in diverse areas like Reliability Engineering, Program,Project and Process Management, Team Management, Operations Management, Database Administration, Design, Development, System analysis and Study, Implementation,... more>>
6,758

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed CyberArk Privileged Account Security: The ability to start the project, install and add...
115
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions. CyberArk PAS v7.2, v8.2 and v9.7 -Application / Solution Design -Implementation Security Solutions: -Identity... more>>
Reviewed CyberArk Privileged Account Security: Provides automatic password management. We can...
19
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Account Security: Helped us to identify, store, protect, and monitor...
39
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Reviewed Oracle Identity Manager (Oracle IAM): Some of the valuable features are provisioning...
9
Global Privilege Access Management Technical Architect
CyberArk Privilege Access Management Architect
Reviewed CyberArk Privileged Account Security: All access to our servers, by both staff and...
19
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Account Security: Can provide transparent connection to targeted...
233
Senior Consultant
CISSP - Certified Information Systems Security Professional (ISC)² , certified IT security professional and having technological forte in the area of IDAM (Identity and Access Management) solutions, Federation , Web Services security, SOA and middle-ware security . Worked extensively with... more>>
Reviewed IBM Tivoli Access Manager: We're able to generate user accounts much quicker...
274
TOP 10
Lead Consultant
10+ years of experience in Information Security covering areas of both enterprise and consumer security – Identity & Access Management. Played various roles in last 10 years across Implementation, Architecting, Design & Development, Support, Pre-Sales, across multiple organizations. ... more>>
327
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
302
As a technical lead lead in Wipro, I am working with a team managing the identity and access for a secured environment for a banking client. In total I have about 9 years of industry experience with Telecom and banking domains. My niche is IBM Security Access Manager (WebSEAL) along with... more>>
Reviewed IBM Tivoli Access Manager: Has provided more secure computing. Unfortunately,...
910
Senior Software Engineer
Identity and Access management professional with 4 year and 3 months experience in the areas of Internet Security using IBM and Oracle tools and Technologies. Engagement in some of the large scale environment like SBI General Insurance Corporation Ltd (INDIA), UK Asset Resolution (UK) and... more>>
Reviewed IBM Tivoli Identity Manager: It is one of the best available products in the...
291
TOP 20
IAM Consultant
Specialties: Microsoft Forefront Identity Manager Microsoft Identity Lifecycle Manager Microsoft Active Directory Federation Services IBM Tivoli Access Manager IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Tivoli Directory Server IBM Tivoli Enterprise Single Sign... more>>
Reviewed Microsoft Bhold Forefront Identity Manager [EOL]: FIM leads to better security but work is needed on...
656
Senior Technical Consultant
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products. Specialties: * Java * Oracle Application Development Framework (ADF) * Oracle Service Oriented Architecture... more>>
Reviewed Oracle Identity Manager (Oracle IAM): Good solution for mid and large level organizations...
1,874
Senior Infrastructure Engineer
Over 9+ years of experience with technical exposure in IDM and ERP solutions. Lead a team of IDM Developers before moving on to become a senior consultant. Have exposure of both CA and Oracle IDM Products Specialties: Identity and Access Management. Information security. Governance. Product... more>>
Reviewed Oracle Identity Manager (Oracle IAM): It has helped in the automation of account handling...
281
Cyber Security Consultant
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
Reviewed CyberArk Privileged Account Security: I can customize it to meet our customers'...
147
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
623
Special Consultant
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
219
Working on Identity and Access Management
To grow up with a professionally managed learning organization and work in a challenging environment requiring constant development of fresh skills and utilize my existing skills to achieve goals
Reviewed Microsoft Bhold Forefront Identity Manager [EOL]: FIM 2010 SP1 is a good product for all those...
621
Profile Summary 10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications Experience Summary a) Total IT Experience - 10 Years b) Security... more>>
Reviewed CA Identity Manager (CA IAM): Setup is considered straightforward due to a wizard...
270
Sr. OIM Consultant
Java/J2EE programming, Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance, Identity Management Administration and Development
Reviewed Oracle Identity Manager (Oracle IAM): I like the delegated administration, centralized...
644
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products. Last 10+ years working in... more>>
Reviewed IBM Tivoli Access Manager: WebSEAL provides a large number of authentication...
32
Security Solution Specialist
8 years of experience in Identity and Access Management and Information Security Domain. Key player in execution of IAM projects for multiple clients in various domains like telecom, retail, banking, insurance, health care. Expertise in design and implementation of Identity and Access... more>>
Reviewed IBM Tivoli Identity Manager: It needs a business user oriented UI but the...
253
Senior Technical Consultant
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management Specialties: IT
Reviewed CA Identity Manager (CA IAM): Better recovery for the app server with the DB...
888
Principal Consultant
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>

Sign Up with Email