One Identity Manager vs SailPoint IdentityIQ vs Securonix Next-Gen SIEM comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between One Identity Manager, SailPoint IdentityIQ, and Securonix Next-Gen SIEM based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM).
To learn more, read our detailed Identity Management (IM) Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
765,386 professionals have used our research since 2012.
Questions from the Community
Top Answer:We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to… more »
Top Answer:My client deals directly with the Omada Identity team in terms of licensing. I never look at pricing, so I'm not aware… more »
Top Answer:There are some technical bits and pieces that we have looked at that could be better. For instance, when you do a… more »
Top Answer:One Identity Manager offers several features that I found advantageous compared to other tools.
Top Answer:One Identity Manager has a reasonable price point. Given the features and functionality it provides, the cost is… more »
Top Answer:One area where One Identity Manager could be improved is in database performance. When handling a large number of users… more »
Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to… more »
Top Answer:The first valuable feature of the solution is its interface. The second feature of the solution is the level of… more »
Top Answer:I found the pricing to be relatively high. The pilot project for two hundred and fifty users over an eighteen-month… more »
Top Answer:In my market, a lot of financial companies had or have an ArcSight installation. Just because in former times it was… more »
Top Answer:We can customize our use cases with the tools provided by Securonix It is an excellent tool that can ingest data in… more »
Top Answer:The pricing is fine compared to the market but I think that at some point the competitors will catch up on price. It… more »
Comparisons
Also Known As
Omada Identity Suite, Omada Identity Cloud
Quest One Identity Manager, Dell One Identity Manager
IdentityIQ, SailPoint IdentityNow
Securonix Security Analytics
Learn More
Overview

Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies.

One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.

Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.

One Identity consistently provides robust security solutions that facilitate a strong secure enterprise where the users, applications, and critical data are safe and secure. The unified identity security platform provides identity governance and administration (IGA), privileged access management (PAM), active directory management and security (ADMS), and identity and access management (IAM) processes to ensure an aggressive stance on security for today’s dynamic enterprise organizations.

One Identity is used by more than 11,000 organizations worldwide managing over five hundred million plus identities.

One Identity Manager Features

  • Self-service options: Organizations save time and are able to get tasks completed easily. Users can request permissions or access and receive predetermined approval based on role assignments.

  • Password management: Organizations can easily reset user passwords based on established organizational protocols. Password policies can be determined according to user roles and assignments.

  • Governance: One Identity Manager offers complete visibility regarding data access, such as who has access, when the access was given, and the reasons why access was given. The solution delivers clear reporting to comply with any regulatory requirements.

  • SAP certified: Users are able to amplify existing SAP security protocols and seamlessly connect accounts under governance. One Identity Manager is a complete identity access solution.

  • Reporting: One Identity Manager delivers reliable reporting regarding user access and privileged access to an organization's network. The reporting can satisfy all government and regulatory compliance standards.

  • Connectors: One Identity Manager’s significant amount of available connectors enable organizations to easily extend identity governance to the cloud and will ensure cloud application time is minimized significantly.

Reviews from Real Users

The initial setup process for an employee is straightforward. We set up processes for user accounts and we can add other processes to them. Our goal is to automate all user-permission and user-administration processes with One Identity and we are doing that more and more.” - Marc H., IT Architect at a tech services company

“The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities.” - Security Consultant at a financial services firm

SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of companies worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, and ensuring that each worker has the right access to do their job, no more, no less. With SailPoint at the foundation of their business, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.

Securonix Security Analytics SNYPR is a next-generation security analytics platform that transforms big data into actionable security intelligence, enabling you to take care of so much more than simply your SIEM (security information and event management) needs. In addition, it contains all of the tools that you may need to enable your organization to successfully handle both log management as well as UEBA (user and entity behavior analytics)-related tasks. The SNYPR management platform gives users the ability to combine security orchestration, automation, and response, security information and event management, network traffic analysis, and user and entity behavior analytics. This single technical environment does away with your need for multiple security, management, and analytics solutions.

Securonix Security Analytics SNYPR’s unified platform can be scaled up to handle up to one million security events every second. While this load may seem heavy, SNYPR handles it with ease. It is able to reduce incidents of false security positives by 60%. The access certification workload that IT administrators and managers need to deal with can be reduced by as much as 90%.

The model that this platform uses is based on a machine learning algorithm. This model gives Securonix Security Analytics’s SNYPR platform a number of extremely valuable capabilities. The platform gathers many different types of data and applies what it learns to threats as they arise. The system assigns threats risk values to determine where the areas of highest need are. Machine learning also allows you to respond to slow acting threats by using historical data to inform your response.

All of the data that the system gathers is stitched together and used to create a complete picture of the risks that the system faces. Any blind spots that may exist are exposed by the collaborative UI that compiles the system data in a single location. This also increases your ability to monitor advanced application threats. 

Key Features

Some of Securonix Security Analytics’s SNYPR platform’s key features include:

  • The ability to enrich all data that the SNYPR platform collects. When SNYPR gathers information, it applies relevant data which can be used in the future to gauge whether or not a particular event is a threat.
  • The ability for data redundancy to automatically take place. All of the data that is gathered, analyzed, and processed by SNYPR is automatically copied and distributed across the system. If there is a failure in any particular part of the system, the information will still be preserved.
  • The ability to track historical issues and use that information to help deal with current threats. The SPOTTER feature allows analysts to look back at both old data and the contextual information that is attached to it. They can then use that data to inform their responses to similar threats that they are currently dealing with.

Reviews from Real Users

Securonix Security Analytics SNYPR platform stands out among its competitors for a number of reasons. Two major ones are its ability to significantly reduce the number of false positives that administrators have to deal with and the way that it incorporates contextual information into security events to reduce the time spent finding solutions to problems that arise.

Peerspot users note the effectiveness of these features. One user wrote, “Securonix’s analytics-driven approach for helping to find sophisticated threats and reduce false positives is pretty good. We are allowed to fine-tune according to our requirements and our clients' requirements, which does reduce false positives. In the last 24 hours, the total number of policies with triggers was 233. When I started with this product, the false positives were 561. Therefore, the solution has helped by tuning or reducing false positives.”

Another user noted, “The way that a Securonix is able to put a lot of the contextual information into the events is very helpful. That has reduced the amount of time required for investigating, ‘Hey, this might be something I need to look at,’ and then doing further research. It puts all of those violations in one event or case, so that you can look at different types of violations that all correlate. That has reduced the amount of time for researching some of those cases. It's dependent upon the scenario, but in some cases it could save an hour of going out and doing a bunch of individual searches.”

Sample Customers
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group
Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
Adobe, AXA Technology Services, Cuna Mutual Group, Equifax, ING Direct, Orrstown Bank, Rockwell Automation, SallieMae, Spirit Aerosystems, TEL
Dtex Systems Pfizer Western Union Harris ITG
Top Industries
REVIEWERS
Government18%
Computer Software Company12%
Energy/Utilities Company12%
Manufacturing Company12%
VISITORS READING REVIEWS
Financial Services Firm15%
Computer Software Company13%
Manufacturing Company7%
Government7%
REVIEWERS
Financial Services Firm38%
Manufacturing Company10%
Healthcare Company10%
Construction Company8%
VISITORS READING REVIEWS
Computer Software Company17%
Financial Services Firm13%
Government9%
Manufacturing Company6%
REVIEWERS
Financial Services Firm34%
Computer Software Company21%
Energy/Utilities Company10%
Insurance Company7%
VISITORS READING REVIEWS
Financial Services Firm17%
Computer Software Company14%
Manufacturing Company8%
Insurance Company6%
REVIEWERS
Financial Services Firm22%
Computer Software Company22%
Manufacturing Company11%
Comms Service Provider11%
VISITORS READING REVIEWS
Computer Software Company18%
Financial Services Firm12%
Government7%
Manufacturing Company6%
Company Size
REVIEWERS
Small Business16%
Midsize Enterprise7%
Large Enterprise77%
VISITORS READING REVIEWS
Small Business18%
Midsize Enterprise14%
Large Enterprise69%
REVIEWERS
Small Business29%
Midsize Enterprise6%
Large Enterprise65%
VISITORS READING REVIEWS
Small Business22%
Midsize Enterprise14%
Large Enterprise63%
REVIEWERS
Small Business33%
Midsize Enterprise12%
Large Enterprise55%
VISITORS READING REVIEWS
Small Business18%
Midsize Enterprise12%
Large Enterprise70%
REVIEWERS
Small Business22%
Midsize Enterprise19%
Large Enterprise59%
VISITORS READING REVIEWS
Small Business24%
Midsize Enterprise15%
Large Enterprise61%
Buyer's Guide
Identity Management (IM)
March 2024
Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM). Updated: March 2024.
765,386 professionals have used our research since 2012.