Symantec Identity Governance and Administration Valuable Features

YC
Manager at a computer software company with 501-1,000 employees

It's good for having partial capabilities.

It offers a nice price. It's mid-range. 

It works well on-premises. 

View full review »
it_user351660 - PeerSpot reviewer
Sr. Systems Analyst/Tech Lead at Loblaw Companies Limited

The most valuable feature is probably the role-base access granting, so we actually control everyone's access through roles. There are ad hoc accesses, but for the most part by being on-boarded as an employee or as contractor, you get a different set of baseline accesses. Those are managed through the Identity Management suite. Those will give you things like email, active directory account, access to our remedy ticketing system, and access to CA PPM.

It also allows us to manage different types of users in different scenarios and different structures in active directory. For example, if you're a union warehouse employee, you don't need an email address. Or, if you're a contractor, it doesn't matter where your location is because you'll never be treated as an employee. All those different attributes are managed through Identity Manager.

View full review »
MW
Managing Director at a consultancy with 1-10 employees

The product is relatively easier to use than other identity management products, such as Oracle Identity Management, Micro Focus Identity, or IBM Security Identity Manager. Also, it offers a few free connectors for connecting to applications like SAP, Aruba, etc.

View full review »
Buyer's Guide
Symantec Identity Governance and Administration
March 2024
Learn what your peers think about Symantec Identity Governance and Administration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
VM
Principal Security Architect II at a engineering company with 1,001-5,000 employees

We only need one pane of glass to see what users have access to, especially privileged accounts.

View full review »
it_user326463 - PeerSpot reviewer
Domestic Markets - Finance at a financial services firm with 1,001-5,000 employees

The range of provisionning possibilities, such as native connectors and tools which facilitate the development of new ones.

View full review »
AS
ALiBS Solutions at ALiBS Solutions

This solution is very easy to use. Once it's been configured correctly, it's very easy to use, but it's not an easy tool to configure. Technically speaking, you need a lot of knowledge to make it run properly.

View full review »
Efrén Yanez - PeerSpot reviewer
Security Manager & CM Specialist & Mainframe Specialist en eSoft at eSoft 2006
  • The xPress technologies (connector xPress/Policy xPress/Config xPress)
  • Integration with API Management and other CA solutions
  • Facility to publish the web services of any task of Identity Manager
  • Ease of integration to leverage authentication processes managed by Identity Manager and called by external applications
  • You do not depend on the supplier to change screens and validate field, create notifications, etc.
  • True integration between CA Identity Manager and CA Identity Governance for better use of compliance approved roles, data exchange and improved customer experience
  • Availability to implement in the cloud
  • Take advantage of important features of Identity Manager and Identity Governance on the Portar offered by Identity Suite (best user experience) and less technicall knowlegde need

What about Identity Governance and integration with Identity Manager?
This solution makes a seamless integration, leveraging the power of Identity Manager connectors it import the data obtained to Identity Governance; in the opposite direction, the results campaigns from Governance have the ability to update in automatic way the information in Identity Manager, enabling materialization of privileges changes and fulfilling a RBAC model (It is the business strategy to the lowest level of privileges in applications)


Through the implementation of "Identity Suite Virtual Appliance" have created a supremely quick and convenient way to install (Identity Manager / Governance / Portal) with even high availability. Multiple scenarios available on a single console.

View full review »
it_user558450 - PeerSpot reviewer
Sr Prin IT Technologist at Medtronic

The automation that it brings to the enterprise is one of the main things that we looked at.

View full review »
AS
ALiBS Solutions at ALiBS Solutions

I don't think there is a feature that I like most. It does what it has to do. It shows me the information I need, and I can manage it with ease.

The solution is user-friendly and easy to use. 

The initial setup is pretty simple.

The stability is good.

The scalability potential is there if a company needs to expand.

View full review »
Efrén Yanez - PeerSpot reviewer
Security Manager & CM Specialist & Mainframe Specialist en eSoft at eSoft 2006
  • Identifies, debugs and models the privileges of your organization, adapting it to business strategies.
  • Helps discover roles based on available patterns ("basic roles" / "Iterated Search" / "Characteristic Roles" / "Rule Hierarchies Roles" / "User Hierarchy Based Roles" / "Structured Search" / "Obvious Roles").
  • Enables review campaigns to certify user privileges, roles and resources, activating the RACI model in the process.
  • Identity Governance comes with Connector Xpress but if you have Identity Manager you can use the integration between them and import the information that comes from CA Identity Manager and its connectors.
  • Allows the construction of segregation of rights (SoD) rules by definition of the client and enables “detective" and "corrective" levels for violations of business rules policies.
  • Provides a set of SoD rules for SAP in order to apply "best practices" to this type of "endpoint" (more than 3,000 rules / Consult CA Technologies if available in last version).
  • Helps to analyze privileges to find points of cleaning and improvement (Similar Roles / Roles Hierarchy / dual link / Suspect connections / Collectors, etc.).
  • Regulatory compliance is one of the objectives of the solution.
  • Covers the life cycle of enterprise privileges and maintains the role model "shallow" or "deep" / "functional" or "granular per application".
  • Helps you take advantage of the Identity Governance on the portal but better if you integrate with Identity Suite (best user experience).
  • You can enable LDAP authentication (AD/others) or integrate with CA Single Sign-On for portal access.
  • Real integration between CA Identity Manager and CA Identity Governance for better use of compliance approved roles, data exchange, and improved customer experience.
  • Data Transformation available using PDI (Pentaho Data Integration)
  • New functionality when integrating with Identity Portal.
View full review »
PS
Lead Solution Advisor at a financial services firm with 10,001+ employees

Policy Xpress.

View full review »
it_user372633 - PeerSpot reviewer
Senior IT Manager at Best Western Hotels & Resorts

I would say the most valuable feature is provisioning where we are able to provide user access to all the resources they need in a uniform way that we can audit. We don't need to spend a month going to every individual server, every individual database granting user access. We can do it from one central place.

For SiteMinder, is the ability to bring applications under its protection very quickly and ability to partner with other companies through Federation and SAML using open standards to do authentication. We are able to partner with other vendors much more quickly no because before we had to do our home grown authentication things and they had to adapt to our non-standard way of doing things. Now, we have open standards. We publish a document to them with our SAML configuration, the documents we are going to be sending them and they code to it. We get on board very, very quickly.

View full review »
it_user197580 - PeerSpot reviewer
Enterprise Architect at a healthcare company with 1,001-5,000 employees

Identity Manager allows us to have a programmatic and paradigm shift in the way that we handle identities within our organization. What we had in the past was sort of a homegrown-built system to manage identities. That is individuals coming onto our systems and out of our systems. With the Identity Manager product, we're able to automate that in a way that we couldn't in the past. The single largest improvement has really been the ability to take what was a paper sort of process, e-mail sort of process, manager phone call process, down to an automated process which allowed us to go from one week to provision someone to ask the appropriate access down to about two hours.

View full review »
Sudip Karmacharya - PeerSpot reviewer
Information Security Specialist at CAS Trading House

What I found most valuable in Symantec Identity Governance and Administration is its simple GUI. It's also easy to deploy compared to other products. With other products, you have to install the Windows version inside the Windows machine on all units, but with Symantec Identity Governance and Administration, it can work offline, so the solution is a little bit easier than other systems.

View full review »
MB
Operation Risk Senior Manager/CRO at I-SCORE

Out-of-the-box connectors have a lot of opportunities for configuration. The governance port and business rules are difficult. At a certain point, the product discovers dormant accounts because it monitors which accounts are active but which are not being used. So it will perform some service on these dormant accounts that are not active for six months or maybe never used before. This is a good feature. We also have a dynamic workflow, with approval stages which helps validate the ID.  

They have a form designer, which is good because you can create exactly what you want as far as access controls. They have value-added modules like the one they have for asset management. This means that when you are in the role of a manager in CA IDM, you are able to restrict access to certain types of laptops — maybe by mobile provider, maybe by core type. So if a user tries to access the system with an asset of a certain type, we can allow it. It is a value-add, not necessarily related to the user distinctly. But if you take it from the point of view of asset management, it also helps in tracking the assets, which is another interesting outcome.  

View full review »
it_user349428 - PeerSpot reviewer
Software Engineer at a healthcare company with 1,001-5,000 employees

The most valuable features are role-based access and identity provisioning, which allow a single point of user access to multiple places.

View full review »
it_user351318 - PeerSpot reviewer
Senior Information Security Analyst with 10,001+ employees

We had a big problem with accounts synchronization provision as we used a very old identity manager solution, and we needed to change it. Then we acquired the new CA solution and we changed the solution. 

It was a big challenge to change in only four months to CA Identity Manager, but we did it. Now we have accounts synchronization and self-service password reset. 

Over the next two years, we will implement a new solution with CA for the accounts to put in Identity Governance. We need to implement 70 new systems inside Identity Manager.

View full review »
it_user372519 - PeerSpot reviewer
CIO at Bank Hapoalim

We are using the IDM solution for customer identification and authorization. We just started the project about a year ago. We have already implemented IDM on our website and our mobile applications. So far it's looking good. It's an interesting question because what we are getting back from our customers, they're quite afraid of what's happening because we have actually gone down from three identifiers on our website to two. In our mobile applications, we are now enabling one identifier and we have just implemented fingerprint recognition. Our customers were calling us and asking "look we are seeing cyber attacks happening, identification being stolen all over the world. How are you actually going down and using only this parameters for identification?"

I think that the CA product enables us to do that. Get more security with lesser need of user identification.

View full review »
it_user779286 - PeerSpot reviewer
Consultant at Deloitte

User access control.

View full review »
it_user183003 - PeerSpot reviewer
Director of Engineering at a tech services company with 51-200 employees

The most valuable features of this product are the following:

  1. Policy Xpress
    Allows for the ability to build policies triggered off of events in a codeless manner.
  2. Separation of Duty (SOD) policies
    Gives the ability to create roles and/or policies with a criteria for removal or addition of a role, policy, or an entitlement based on the user’s title as an example.
  3. Connectors
    IDM has a rich set of connectors that covers traditional on premise, SAAS related, or custom resources. IDM provides the ability to create a custom connector through its Connector Xpress module. The module itself allows one to build a connector to any resource that is either LDAP or database driven. Once again this process involves no coding for the task.
View full review »
SM
CEO at Next Generation Technocom Pvt Ltd

The product’s most valuable feature is flexibility. It can be customized as per the customer’s requirements.

View full review »
PD
Delivery consultant at a computer software company with 10,001+ employees

I feel the provisioning to be done well. The model offered is very good and customizable. 

View full review »
RK
Technologist at a healthcare company with 10,001+ employees

Writing policies and provisioning are easy.

View full review »
it_user778986 - PeerSpot reviewer
Product Manager at Suramericana
  • Governance
  • Identity
View full review »
it_user124563 - PeerSpot reviewer
Head of Identity and Access Management at a financial services firm with 1,001-5,000 employees

The most valuable features to us are:

  • Provisioning engine (on the back-end, separate from front-end components, that's part of layered architecture);
  • Access-request system (to manage on- and off-boarding of users); and
  • Mobile interface (ability to manage workflows and user requests from smartphone).
View full review »
it_user32025 - PeerSpot reviewer
Managing Director, Application Development

One of the primary features we use is the password reset. The challenge we had was that our helpdesk had to manually reset customers in the field and reset their passwords one at a time, so we implemented CA Identity Manager to allow us to automate this self service reset of passwords.

View full review »
it_user342633 - PeerSpot reviewer
SiteMinder Engineer at a government with 501-1,000 employees

I use the user record (a permanently stored data element), self-service features (access requests, application access, remove/change users), and the rules and entitlements for users.

View full review »
it_user293976 - PeerSpot reviewer
Senior Infrastructure Engineer with 10,001+ employees

The product is easy to install, setup and configure. For me the ease of installation and configuration was most valuable as my experience with earlier Oracle Identity Manager products was slightly tedious. Things might be different now with Oracle products though. Also, CA provided a long list of standard connectors which did not require too much of customization and it suited well with the customer.

View full review »
it_user558657 - PeerSpot reviewer
Snr Application Analyst at Rogers Communication

The valuable features are the speed and the ability to provision all of our employees. I like the usability as well.

View full review »
it_user328731 - PeerSpot reviewer
Information Security Manager at a aerospace/defense firm with 1,001-5,000 employees
  • The user interface
  • The synchronization with our HR system
View full review »
it_user334890 - PeerSpot reviewer
Manager, Identity and Access Management with 10,001+ employees

It gives us the ability to automate the IAM process.

View full review »
MM
General Manager at Global SEIS

The most valuable aspects of Symantec Identity Governance and Administration are all the features, it is the most complete solution on the market. It has features, such as scanners and portals, it has everything.

View full review »
UA
Enterprise Solutions & Services Head at Duroob Technology

There are many valuable features within the solution. The product is easy to customize. It’s also highly secure.

View full review »
DS
Solutions Architect at MAINT

Self-registration and self-service password management are valuable features. The role modeling feature is also very useful. It allows you to model your enterprise role.

View full review »
it_user345663 - PeerSpot reviewer
Senior Manager - Identity and Access Management at a financial services firm with 1,001-5,000 employees

Automated provisioning removes manual labor and manual provisioning.

View full review »
it_user558459 - PeerSpot reviewer
CTO, Application Development at a tech services company with 501-1,000 employees

We take identity management seriously and CA IDM is helping us to accomplish that goal.

We have streamlined the identity management process, but we are not completely utilizing all the features of CA IDM. This product is a milestone/cornerstone for us to accomplish our identity management goals.

View full review »
it_user354783 - PeerSpot reviewer
Sr. IT Security Architect at a healthcare company with 1,001-5,000 employees

The most valuable features include governance certification and creation of rules. Ones the rules are created, they're put into IdentityMinder so that IdentityMinder can use those rules to provision all the users from provisioning or de-provisioning based on HR processes to create targeted endpoints. One of the targeted endpoints is used as the authentication alteration source for CS. What Identity Governance does is that it allows us to see the full, big picture of all this inter-connectivity.

View full review »
it_user351561 - PeerSpot reviewer
Middleware Engineer at a energy/utilities company with 10,001+ employees

The features that I find most valuable are the creation of access and admin roles. You can also manage many different applications -- more than one hundred -- in only one box. It also adds a level of security that we didn't have previously.

View full review »
WA
Technical Support Manager at Future systems

I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so.

It's easy to deploy, it's two versions, the manual deployment version, if it can be prepared in clusters it'll take one or two days. But the software appliance will take from 15 to 20 minutes.

View full review »
it_user304782 - PeerSpot reviewer
Middleware specialist at a insurance company with 10,001+ employees

Our customers find it easy to use.

View full review »
RC
Solution Architect with 1-10 employees

Ease of use for the configuration of provisioning accounts through an account template concept for an OOTB connector.

It does not requires an extensive programming or development background. The screen of the admin tool creates an account on the system to CA IAM, which provides it to the OOTB connector, then you can simply configure CA IAM to do the provisioning. CA IAM can help with the automation of user provisioning at the same level as the system admin. 

When comparing it to other products, you can set up CA IAM in a PoC very quickly to demonstrate its provisioning capabilities.

It fits for organizations having simple, basic provisioning requirements. If your organization has complex provisioning use cases and requirements, then you must have an architect and developer on the team to help bridge the gap that CA IAM cannot provide.

View full review »
it_user558513 - PeerSpot reviewer
Information Technology Specialist - Information Security at a government with 1,001-5,000 employees

The most valuable features of this product are the legacy interfacing - interfaces with our mainframe - as well as provisioning.

View full review »
it_user294231 - PeerSpot reviewer
Information Security Analyst at a financial services firm with 10,001+ employees
  • User-friendly UI
  • In built connectors for various endpoints
View full review »
it_user175146 - PeerSpot reviewer
System Engineer at a tech services company with 10,001+ employees

Connector Development (connector Express) and Policy Express enhanced feature which is improving every time with new releases.

View full review »
it_user348315 - PeerSpot reviewer
Information Security Analyst at a financial services firm with 1,001-5,000 employees

As far as valuable features go, one of the first ones is self-provisioning. The best thing is that our internal employees can provision their own access using the tool rather than contacting an internal group. Its built-in workflow handles all the needed approvals before it will provision the access.

View full review »
it_user326493 - PeerSpot reviewer
Enterprise Architect at a insurance company with 1,001-5,000 employees

I find that the propagation of identities is what is most valuable about the solution.

View full review »
it_user176052 - PeerSpot reviewer
Manager at Flex Consultancy Services Pte Ltd

Identity Policy and its Ability to support Account Provisioning to RACF and AD/Exchange.

View full review »
FM
Senior Manager at a tech services company with 501-1,000 employees

Word mining and risk campaigns are the most valuable features of this solution.

View full review »
it_user310890 - PeerSpot reviewer
Chief Consultant at a tech services company with 1,001-5,000 employees
  • Self-service
  • Role-based provisioning
  • Access
View full review »
it_user778596 - PeerSpot reviewer
Developer at a tech vendor with 1,001-5,000 employees

It has good endpoint support and endpoint connectivity to different versioning endpoints.

View full review »
it_user179250 - PeerSpot reviewer
Applications Analyst with 10,001+ employees

Policy Xpress makes modifications to how our user data is handled so easy.

View full review »
it_user178560 - PeerSpot reviewer
Assistant Manager at a transportation company with 1,001-5,000 employees

Extremely good customization possible with respect to local language support.

View full review »
it_user178146 - PeerSpot reviewer
Manager, Domain Services Tech Ops at a hospitality company with 1,001-5,000 employees
  • User provisioning
  • Web services
View full review »
it_user184776 - PeerSpot reviewer
Senior Technical Consultant at a consultancy with 51-200 employees
  • Group management
  • Task delegation
  • Access granularity
View full review »
AS
Systems-Engineer at a tech services company with 10,001+ employees

This is the only IM solution I have come across. Using the implementation guide, I was able to implement the solution with ease. The IM is the most valuable feature to me. I also find the solution's documentation and community valuable.

View full review »
it_user178524 - PeerSpot reviewer
Senior Solutions Architect at a tech services company with 51-200 employees

The simplicity, easy installation and configuration.

View full review »
it_user176574 - PeerSpot reviewer
Delivery Manager at a tech services company with 51-200 employees

Provisioning server and Policy Xpress.

View full review »
it_user1125 - PeerSpot reviewer
Network Engineer at a retailer with 51-200 employees
• Allows individual users to work in a controlled and secure environment, whereby user authentication, access control, password administration, and smooth workflow are ensured. • Even if a user forgets theirs access information or password, Identity Manager helps users to restore access. This reduces the cost of help-desk support while making the daily operations much smoother. • Large sized organizations require Identity Manager to ensure that their network and systems are secure for use or for access by delegated users. • It ensures that business workflow is in compliance with secure standards of technology infrastructure. View full review »
it_user723975 - PeerSpot reviewer
Senior Information Security Analyst at a insurance company with 10,001+ employees

Manage access certifications for whole company in one place.

View full review »
it_user334941 - PeerSpot reviewer
Security Consulting Manager at a tech services company with 10,001+ employees
  • Identity
  • Lifecycle
  • Provisioning
View full review »
it_user201936 - PeerSpot reviewer
Security Manager at a tech services company with 10,001+ employees

The ability to customise the screen, and create a technical solution suited to the business requirements including delegation, password management and role based access.

View full review »
it_user401733 - PeerSpot reviewer
Managing Director at a tech services company with 1-10 employees

Connector Xpress and Policy Xpress and the new interface.

View full review »
it_user1062 - PeerSpot reviewer
Tech Support Staff at a tech company with 51-200 employees
• Identity manager enables automated processes of entitlements, management as well as deletion, and creation of user accounts. • Access to all enterprise systems like relational databases can be managed efficiently. • Identity manager decentralizes group membership and role management, by allowing administration of delegated users, and therefore scalability and less maintenance can be achieved. It is flexible, reduces the costs of administration and increases accountability, improves security, and lowers help desk workloads. View full review »
Buyer's Guide
Symantec Identity Governance and Administration
March 2024
Learn what your peers think about Symantec Identity Governance and Administration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.