Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
253,234 professionals have used our research since 2012.
Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
253,234 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 17.5% (weighting factor) * 80% = 14. For Average Rating, the maximum score is 30 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

What is Identity and Access Management (IAM)?

When selecting Identity and Access Management solutions, it's important to examine your organization's requirements including if internal and/or remote access is required. According to IT Central Station users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.


Identity and Access Management (IAM) Reviews

Read reviews of Identity and Access Management (IAM) that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Anonymous avatar x80
Real User
Cyber Security Engineer at a recruiting/HR firm with 51-200 employees

What is most valuable?

Randomizing local accounts on all endpoints * ERPM's greatest ability is that it can easily randomize ALL local accounts on almost any endpoint. One of biggest security risks that occur within a company is the ability of an attacker to... more»

How has it helped my organization?

* RDP * Admin Checkouts * Removing hard-coded credentials from most of our built-in Apps

What needs improvement?

One of the features that ERPM is capable of providing is giving users the ability to 'request' admin credentials on their machines for a specific purpose (provided you have removed all users from local admin on their machines). You can force... more»
Anonymous avatar x80
Real User
Security Manager at a tech services company with 10,001+ employees
Aug 20 2017

What is most valuable?

The best part of Oracle Identity Manager is how well it will align to the business. There are features that are more generally required by business and you can easily get them with Oracle Identity Manager. If you compare it with Azure, with... more»

How has it helped my organization?

When I joined my project, they had been using a meta directory for identity management and application provisioning. There were around 150,000 active accounts, out of which many were redundant. They had left the organization 10 years ago.... more»

What needs improvement?

One thing is the size of the infrastructure that is required for Oracle to implement. In addition, the maintenance cost and pricing. With an Oracle implementation, we need to have a high availability of infrastructure where you need a minimum... more»
Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
253,234 professionals have used our research since 2012.
B6c426b2 be87 49c4 ba43 c406eaebb5d4 avatar?1449121566
Reseller
Information Security & PreSales Officer at a tech services company with 51-200 employees

What is most valuable?

The main areas of focus of BeyondTrust products is Privileged Access Management. Along with it, they've also bundled the PAM solutions with a Vulnerability Management solution. We all know Retina Network Security Scanner has been around for... more»

How has it helped my organization?

We implemented the BeyondTrust suite of products as part of our initial evaluation and continued to use the product because we liked it very much. We distribute security solutions to our customers, so we can only sell something to our... more»

What needs improvement?

I'm of the thought that the best products in the market have room for improvement, always, and so is the case with this product as well. I have always submitted the improvements / bugs list to the vendor and am looking forward for them to be... more»
86a124fa 9fa6 4ff2 8766 fb5759579d36 avatar
Real User
Senior Identity and Access Management Specialist at a tech vendor with 1,001-5,000 employees

What is most valuable?

* The GUI is very impressive and clean (even cleaner and minimalistic in v7). * JobQueueInfo does an amazing job tracking all processes. * Synchronizations are easy to set up. * Reporting capabilities are fantastic once you get the hang of... more»

How has it helped my organization?

* Auditing becomes easier from an admin perspective. * There is more control over everything. * Processes are much better defined. * People tend to take some functional roles much more seriously. There were some roles that were very old in... more»

What needs improvement?

* DBQueue processes can bottleneck the system at times. In v7, its apparently re-architectured, and is better. There can be too many of them and they process very slowly, causing actual processes to take a lot more time to complete. * There... more»
Ca2
CA Technologies
Anonymous avatar x80
Real User
Engineering Lead at SunTrust Banks, Inc.
Jan 14 2018

What is most valuable?

Before I used CA Identity Suite, it was a separately installed component, nowadays offered as a Virtual Appliance, and that saves considerable time for installing and controlling it. Deployment Express saves time for modifications and things... more»

How has it helped my organization?

With the Virtual Appliance, combined with CA Identity Manager and GovernanceMinder as one solution, it eliminates having multiple infrastructure requirements, multiple products, and gives a holistic view of access granting.

What needs improvement?

I really haven't thought about features for that next release because it is addressing all of our needs right now. I would say, there is one. If there was a seamless integration between portal and IdentityMinder, then that would help a bit,... more»
3ff6f1d1 706f 47bc ae09 1a9a7e36bae4 avatar
Real User
Consultant at a tech company with 1,001-5,000 employees

What is most valuable?

I think that one of the advantages of the CyberArk PAS suite is that it is modular. On top of the basics, you can implement modules to: * Manage (verify, change and reset) privileged passwords and SSH keys * Manage (isolate and monitor)... more»

How has it helped my organization?

I see companies that already have thought about their privileged accounts, while others have not? And so on. Thinking about these things helps customers to organize their data/privilege accounts in the CyberArk solution. It then helps the... more»

What needs improvement?

With every version, I can see that the product wins on functionality and user experience. On the latter though, I hear from customers that on the UI level, things could be better. CyberArk continuously asks for feedback on the product (e.g.,... more»
Logo
tools4ever
Chieftec194427 li?1423860366
Real User
Chief Technology Officer at a tech services company with 51-200 employees
Aug 09 2017

What is most valuable?

* The visual interface of the scripting * The fact that you don't need to be an actual developer to be able to use the product * Logging, automation, and scheduling, as well as the capability to script via COM objects to create front end web... more»

How has it helped my organization?

Before using UMRA, the creation of users at a School District with 34,000 students used to take approximately three to four weeks to implement using LDIF imports via batch files. Then, after implementing UMRA, all user creations got... more»

What needs improvement?

The UMRA Forms of the product is fantastic, especially for those who do not have the expertise to create the web front ends using COM automation. The problem is that the company may be concentrating on creating something other than the Forms... more»
Anonymous avatar x80
Consultant
SAP consultant at a tech services company
Aug 23 2017

What is most valuable?

I like the core functionality of what IBM provides, like provisioning the triggers. Also, how you can maintain not only SAP back end systems, but non-SAP. The functionality that IBM provides if you're able to implement a certain logic, and if... more»

How has it helped my organization?

In my company, we don't use IBM. I'm just implementing IBM in other companies.

What needs improvement?

The current functionality allows you only to change one user at a time. There is no option to maintain the business roles from the UI using like standard validation, imports, or whatever you have to build your business roles one by one.... more»
Jeffrey everling li?1422123501
Real User
Security Expert at SecurIT

What is most valuable?

As a security engineer, I mostly implement the Enterprise Password Vault Suite (Vault Server, Central Policy Manager, Password Vault Web Access) as this is the base upon which every additional component is built. I am using and implementing... more»

How has it helped my organization?

When implementing CyberArk, I see that a lot of security issues are addressed by the solution. For example, audit issues for privileged (non-personal) accounts, which have a sufficient amount of impact on the organization when being... more»

What needs improvement?

In every product, there is room for improvement. Within CyberArk, I would like to see more support for personal accounts. It can be done right now, but I can imagine changing a few aspects would make this easier and more foolproof. Next to... more»
Nicholas alteen li?1421247806
Real User
Cloud Support Engineer at a tech services company with 10,001+ employees
Jun 28 2017

What is most valuable?

Automation of access provisioning, maintenance, and de-provisioning based on HR employment status. The ability to add in different applications for proper lifecycle management was critical to a successful and streamlined business operation.... more»

How has it helped my organization?

It reduced manual effort for on/off-boarding staff and removed need for manual password management of some critical systems.

What needs improvement?

This is based off using Account Courier and Password Courier exclusively, and may not be indicative of more recent features included in the platform. The entire provisioning and management process needed to be driven by manually developed... more»
Anonymous avatar x80
Real User
Infrastructure Specialist at a financial services firm with 5,001-10,000 employees
Jul 17 2017

What is most valuable?

Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites. These are heavily customizable and can fully integrate with in-house provisioning systems.

How has it helped my organization?

Allows users to use a single password across a set of multi-tenant application suites. This would have otherwise required 50-100 unique passwords per application. This allows the user to inject a centralized password (a.k.a. authentication... more»

What needs improvement?

The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available. The majority of the "IMS profiles" we use are too dangerous to... more»
89343959 c66d 4e1d a2f5 d1c0d2b63f32 avatar
Real User
Cyber Security Consultant at a tech services company with 1,001-5,000 employees

What is most valuable?

* Client-less feature * Flexible architecture support * High level of customization for maximize utilization * User friendly and Flexibility of multiple choice * Adhere to Security Compliance

How has it helped my organization?

This tool is in Leader's quadrant in Gartner Quadrant report. Not just because it has more features than other but also it improves the way organization function. CyberArk can be used as many as you can think of. Such Granular ways of... more»

What needs improvement?

Since this tool major utilizing modules are PAM and PSM, hence AIM and OPM are least considered by client. Client is somehow reluctant to use these features. Yes, i do agree that these Modules are not that friendly but also CyberArk do not... more»
Anonymous avatar x80
Real User
Information Security Advisor at a insurance company with 1,001-5,000 employees

What is most valuable?

Account discovery, account rotation, and account management features make it a well-rounded application. Account discovery allows for auto-detection to search for new accounts in a specific environment such as an LDAP domain. This allows... more»

How has it helped my organization?

In the past, standard practice was to assign role-based rights to standard accounts. Moving away from this structure allows us to require that all heightened access accounts be “checked out” and only operate within a set window. CyberArk... more»

What needs improvement?

Like any software, improvements and upgrades are a necessity. As CyberArk is used by many Fortune 100 and Global 2000 companies, they offer custom solutions that need to be continuously improved as the company changes. I am looking forward to... more»
Anonymous avatar x80
Real User
Solution Architect Lead at a insurance company with 1,001-5,000 employees

What is most valuable?

WebSEAL is a reverse proxy web server that performs authentication and authorizations. It is similar to CA SiteMinder Secure Proxy Server. The advantage of WebSEAL is that WebSEAL supports SPNEGO protocol and Kerberos authentication to... more»

How has it helped my organization?

The combination of TAM with IDM in IBM Tivoli Identity Manager helped us to realize robust and secure authentication infrastructure in accordance with industry regulations and laws. * Providing centralized authentication authority and enforce... more»

What needs improvement?

Due to a constraint of the built-in browser in a Handy phone (called NTT i-Mode), the former version of TAM could not be used in the Japan market. The issue was resolved by the decline of Japan-specific Handy phones. Cookies were not... more»
E60af723 4fa0 4af2 ab90 323a7fa89aee avatar?1435064104
Real User
Managing Director at a tech services company with 51-200 employees
Aug 27 2017

What is most valuable?

* Role Based Access Control * Provisioning, Re-provisioning, De-provisioning and Undo-De-provisioning policies * Data validation policies * Workflows * If Then Else statements * Approval Workflows * Schedule Workflows * Escalation * Virtual... more»

How has it helped my organization?

* Heavily Automates - it will automate the entire provisioning, re-provisioning, de-provisioning and undo-de-provisioning tasks * Complete Audit Trail - it gives an audit trail for each and every activity * Increase in accountability –... more»

What needs improvement?

* Web console – it should have more customization options in terms of look and feel of the landing page * Workflow policies – Additional policies for folder access provisioning * Bring back attestation – Attestation feature is dropped from... more»
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
Consultant
IT Security Consultant at a tech services company with 1,001-5,000 employees

What is most valuable?

Every feature of this product - Password Management, Session Management and so on has its own value depending on different use cases, but I like: * It's a clientless product and does not require any third-party product for any of its... more»

How has it helped my organization?

Due to regular growth of an organization infrastructure, managing passwords within the organization becomes extremely difficult. In larger organizations with a large user and infrastructure base, it can be very difficult to ensure that the... more»

What needs improvement?

CyberArk has evolved a lot in the last 16 years and has nearly all the features required for effective operation. The only area for improvement is using a native client while connecting to the target device instead of the current method of... more»
Anonymous avatar x80
Real User
Enterprise Access Manager at a financial services firm with 1,001-5,000 employees

What is most valuable?

The most valuable feature is that it provides a consistent user interface. That's the primary thing, the consistent user interface.

How has it helped my organization?

Over time, it will improve the way my organization functions. We've had some challenges as far as rolling it out, but that's the goal. We have a consistent set of processes, so we need a consistent toolset to be able to disperse across our... more»

What needs improvement?

One of the things they don't have is, they don't provide support for what are called service accounts, non-human accounts, non-human IDs. That's critical. In addition to that, we have some role mining capabilities that Oracle really hasn't... more»
Ca2
CA Technologies
3817f42e 7176 4bb6 b7cb a12e6a587261 avatar
Real User
Security Manager & CM Specialist at a tech services company with 51-200 employees
Nov 29 2017

What is most valuable?

* Identifies, debugs and models the privileges of your organization, adapting it to business strategies. * Helps discover roles based on available patterns. * Enables review campaigns to certify user privileges, roles and resources,... more»

How has it helped my organization?

In the processes where we need to analyze data, IG has enabled and facilitated the analysis of privileges, generation of roles to cover RBAC and integrate with the solution of Identity Manager, as well as the compliance aspect by the... more»

What needs improvement?

The administrative part is not very intuitive. Actually I think it is because it requires specialization and knowledge in what is done. I found an option to import specific information, but the functionality was non-existent so they have to... more»
Ca2
CA Technologies
82c8a0be d56f 4f65 b5f6 4f0b48802f1d avatar
Real User
Senior Director at a energy/utilities company with 1,001-5,000 employees

What is most valuable?

We have used CA's security stack. We have used CA Identity Manager, CA SSO, CA Privileged Access Manager Server Control, CA Identity Governance and CA Strong Authentication. The total integration of the product was very beneficial for us.... more»

How has it helped my organization?

CA Identity Suite has been extremely helpful for us from the user onboarding/offboarding. We are a company where SOX/PCI, other regulatory compliance is very important to us. It kept us honest from the standpoint of meeting the regulatory... more»

What needs improvement?

The key feature I would like to see is close loop remediation, which is in conjunction with CA Identity Governance today. That will be one of the key features, including the mobility features on password self-service, which will be another... more»
Ca2
CA Technologies
8dd92db8 2755 43b1 ad26 5b5ee54de2bd avatar
Real User
Senior Software Engineer at a retailer with 10,001+ employees
Jan 08 2018

What is most valuable?

As a company, the most valuable feature that we have is our almost real-time feed from our HR systems into CA Identity Manager, which then feeds down to all of our directories or applications that an employee could potentially need to access.

How has it helped my organization?

The multitude of end-points that we can connect to, whether it is an out-of-the-box connector or through a JNDI or a JDBC connection. We can connect to just about every application that we so far have tried to connect to with relative ease.

What needs improvement?

One of the biggest features that we are looking at is more cloud-based options. Right now, there is a connector to Office 365. While it is okay for smaller companies like us, as a 300K plus operation, it is not really quite where it needs to... more»
Identity and access management %28iam%29 report from it central station 2018 01 27 thumbnail
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
253,234 professionals have used our research since 2012.

Identity and Access Management (IAM) Articles

A5223938 eed9 42af 9f16 9a9bd1568f21 avatar
Content and Community Manager
IT Central Station
What do our users think about their Identity and Access Management tools? What do users discuss in their identity and access management reviews in 2017? What have their experiences been this year? In the excerpts below, users discuss valuable features and room for improvement for the following... more»
A5223938 eed9 42af 9f16 9a9bd1568f21 avatar
Content and Community Manager
IT Central Station
What do IT Central Station community members say about the user provisioning software that they use? What do IT Central Station community members from larger enterprise companies say about the user provisioning software that they use? How does Oracle Identity Manager differ from CyberArk... more»
Anonymous avatar x30
Berkley LambThis article doesn't make sense. these are two different tools with two... more»
Birzu alexandru adrian li?1414334311
6,058

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed McAfee Complete Endpoint Protection: If a client needs new components, ePO helps them to...
2be514f8 31cd 4ee4 b367 0ebf2d21b38d avatar
4
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Account Security: Helped us to identify, store, protect, and monitor...
72d8f27d eba1 4479 90b2 f779bedd57b8 avatar
37
Business requirements analysis and building solution architecture, high level design, detail level design documents and implementation of integrated enterprise solutions Technologies : WebLogic 11g, Oracle API(or Enterprise) Gateway (OEG Server, Policy Studio, Policy Center, Service Monitor... more>>
Reviewed Oracle Identity Manager: Some of the valuable features are provisioning...
Baa7dec6 0e6a 4b0b 97f6 60fe478bc4fe avatar
137
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
5889e19e 4af9 4472 bd37 19370fa30e57 avatar
6
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Account Security: Can provide transparent connection to targeted...
Anonymous avatar x100
175
TOP 10
Lead Consultant
10+ years of experience in Information Security covering areas of both enterprise and consumer security – Identity & Access Management. Played various roles in last 10 years across Implementation, Architecting, Design & Development, Support, Pre-Sales, across multiple organizations. ... more>>
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
288
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
Joe varkey li?1421655435
290
TOP 20
IAM Consultant
Specialties: Microsoft Forefront Identity Manager Microsoft Identity Lifecycle Manager Microsoft Active Directory Federation Services IBM Tivoli Access Manager IBM Tivoli Identity Manager IBM Tivoli Federated Identity Manager IBM Tivoli Directory Server IBM Tivoli Enterprise Single Sign... more>>
Reviewed Microsoft Bhold Forefront Identity Manager [EOL]: FIM leads to better security but work is needed on...
Ganesh kamble li?1414331258
654
Senior Technical Consultant
I have more than 4 years of experience in the field of Oracle Products and have worked on integrating Oracle Banking Platform with many other Oracle Products. Specialties: * Java * Oracle Application Development Framework (ADF) * Oracle Service Oriented Architecture... more>>
Mandar deshmukh li?1420496967
644
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products. Last 10+ years working in... more>>
Reviewed IBM Tivoli Access Manager: WebSEAL provides a large number of authentication...
Babel tommy li?1421349953
622
Special Consultant
I have been for many years (17) an Innovative 'Business Technology' pursuer, looking to leverage Information Technology to meet the Business Goals and beat the Business Challenges in fast growing and changing Enterprise Business Environments.
Reviewer176052 li?1419819037
621
Profile Summary 10 years of experience and specialises in the design and implementation of enterprise Account Provisioning Systems. Other experiences cover payment gateways, secured mobile FMCG, and secured web applications Experience Summary a) Total IT Experience - 10 Years b) Security... more>>
Venkat ananthakrishnan li?1423463744
878
Principal Consultant
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>
Anonymous avatar x100
270
Sr. OIM Consultant
Java/J2EE programming, Identification of business needs, Collection of requirements, architecture, Mid-tier and UI design, implementation, testing, deployment and maintenance, Identity Management Administration and Development
Reviewed Oracle Identity Manager: I like the delegated administration, centralized...
Anonymous avatar x100
253
Senior Technical Consultant
Sr. Consultant with more than 10 years of experience in understanding Business Data flows and designing & coordinating Data Interfaces Enterprise Solutions implementation, HR and other interfaces, Technical strategy and management Specialties: IT

Sign Up with Email