Symantec Identity Governance and Administration Valuable Features
YC
reviewer2142495
Manager at a computer software company with 501-1,000 employees
It's good for having partial capabilities.
It offers a nice price. It's mid-range.
It works well on-premises.
View full review »The most valuable feature is probably the role-base access granting, so we actually control everyone's access through roles. There are ad hoc accesses, but for the most part by being on-boarded as an employee or as contractor, you get a different set of baseline accesses. Those are managed through the Identity Management suite. Those will give you things like email, active directory account, access to our remedy ticketing system, and access to CA PPM.
It also allows us to manage different types of users in different scenarios and different structures in active directory. For example, if you're a union warehouse employee, you don't need an email address. Or, if you're a contractor, it doesn't matter where your location is because you'll never be treated as an employee. All those different attributes are managed through Identity Manager.
View full review »MW
reviewer2183661
Managing Director at a consultancy with 1-10 employees
The product is relatively easier to use than other identity management products, such as Oracle Identity Management, Micro Focus Identity, or IBM Security Identity Manager. Also, it offers a few free connectors for connecting to applications like SAP, Aruba, etc.
View full review »Buyer's Guide
Symantec Identity Governance and Administration
March 2024
Learn what your peers think about Symantec Identity Governance and Administration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,740 professionals have used our research since 2012.
VM
PrincipalSecArch140
Principal Security Architect II at a engineering company with 1,001-5,000 employees
We only need one pane of glass to see what users have access to, especially privileged accounts.
View full review »The range of provisionning possibilities, such as native connectors and tools which facilitate the development of new ones.
View full review »AS
Alfredo Silva
ALiBS Solutions at ALiBS Solutions
This solution is very easy to use. Once it's been configured correctly, it's very easy to use, but it's not an easy tool to configure. Technically speaking, you need a lot of knowledge to make it run properly.
View full review »- The xPress technologies (connector xPress/Policy xPress/Config xPress)
- Integration with API Management and other CA solutions
- Facility to publish the web services of any task of Identity Manager
- Ease of integration to leverage authentication processes managed by Identity Manager and called by external applications
- You do not depend on the supplier to change screens and validate field, create notifications, etc.
- True integration between CA Identity Manager and CA Identity Governance for better use of compliance approved roles, data exchange and improved customer experience
- Availability to implement in the cloud
- Take advantage of important features of Identity Manager and Identity Governance on the Portar offered by Identity Suite (best user experience) and less technicall knowlegde need
What about Identity Governance and integration with Identity Manager?
This solution makes a seamless integration, leveraging the power of Identity Manager connectors it import the data obtained to Identity Governance; in the opposite direction, the results campaigns from Governance have the ability to update in automatic way the information in Identity Manager, enabling materialization of privileges changes and fulfilling a RBAC model (It is the business strategy to the lowest level of privileges in applications)
Through the implementation of "Identity Suite Virtual Appliance" have created a supremely quick and convenient way to install (Identity Manager / Governance / Portal) with even high availability. Multiple scenarios available on a single console.
View full review »The automation that it brings to the enterprise is one of the main things that we looked at.
View full review »AS
Alfredo Silva
ALiBS Solutions at ALiBS Solutions
I don't think there is a feature that I like most. It does what it has to do. It shows me the information I need, and I can manage it with ease.
The solution is user-friendly and easy to use.
The initial setup is pretty simple.
The stability is good.
The scalability potential is there if a company needs to expand.
View full review »- Identifies, debugs and models the privileges of your organization, adapting it to business strategies.
- Helps discover roles based on available patterns ("basic roles" / "Iterated Search" / "Characteristic Roles" / "Rule Hierarchies Roles" / "User Hierarchy Based Roles" / "Structured Search" / "Obvious Roles").
- Enables review campaigns to certify user privileges, roles and resources, activating the RACI model in the process.
- Identity Governance comes with Connector Xpress but if you have Identity Manager you can use the integration between them and import the information that comes from CA Identity Manager and its connectors.
- Allows the construction of segregation of rights (SoD) rules by definition of the client and enables “detective" and "corrective" levels for violations of business rules policies.
- Provides a set of SoD rules for SAP in order to apply "best practices" to this type of "endpoint" (more than 3,000 rules / Consult CA Technologies if available in last version).
- Helps to analyze privileges to find points of cleaning and improvement (Similar Roles / Roles Hierarchy / dual link / Suspect connections / Collectors, etc.).
- Regulatory compliance is one of the objectives of the solution.
- Covers the life cycle of enterprise privileges and maintains the role model "shallow" or "deep" / "functional" or "granular per application".
- Helps you take advantage of the Identity Governance on the portal but better if you integrate with Identity Suite (best user experience).
- You can enable LDAP authentication (AD/others) or integrate with CA Single Sign-On for portal access.
- Real integration between CA Identity Manager and CA Identity Governance for better use of compliance approved roles, data exchange, and improved customer experience.
- Data Transformation available using PDI (Pentaho Data Integration)
- New functionality when integrating with Identity Portal.
PS
LeadSolu4b96
Lead Solution Advisor at a financial services firm with 10,001+ employees
Policy Xpress.
View full review »I would say the most valuable feature is provisioning where we are able to provide user access to all the resources they need in a uniform way that we can audit. We don't need to spend a month going to every individual server, every individual database granting user access. We can do it from one central place.
For SiteMinder, is the ability to bring applications under its protection very quickly and ability to partner with other companies through Federation and SAML using open standards to do authentication. We are able to partner with other vendors much more quickly no because before we had to do our home grown authentication things and they had to adapt to our non-standard way of doing things. Now, we have open standards. We publish a document to them with our SAML configuration, the documents we are going to be sending them and they code to it. We get on board very, very quickly.
View full review »Identity Manager allows us to have a programmatic and paradigm shift in the way that we handle identities within our organization. What we had in the past was sort of a homegrown-built system to manage identities. That is individuals coming onto our systems and out of our systems. With the Identity Manager product, we're able to automate that in a way that we couldn't in the past. The single largest improvement has really been the ability to take what was a paper sort of process, e-mail sort of process, manager phone call process, down to an automated process which allowed us to go from one week to provision someone to ask the appropriate access down to about two hours.
What I found most valuable in Symantec Identity Governance and Administration is its simple GUI. It's also easy to deploy compared to other products. With other products, you have to install the Windows version inside the Windows machine on all units, but with Symantec Identity Governance and Administration, it can work offline, so the solution is a little bit easier than other systems.
View full review »MB
MostafaBasha
Operation Risk Senior Manager/CRO at I-SCORE
Out-of-the-box connectors have a lot of opportunities for configuration. The governance port and business rules are difficult. At a certain point, the product discovers dormant accounts because it monitors which accounts are active but which are not being used. So it will perform some service on these dormant accounts that are not active for six months or maybe never used before. This is a good feature. We also have a dynamic workflow, with approval stages which helps validate the ID.
They have a form designer, which is good because you can create exactly what you want as far as access controls. They have value-added modules like the one they have for asset management. This means that when you are in the role of a manager in CA IDM, you are able to restrict access to certain types of laptops — maybe by mobile provider, maybe by core type. So if a user tries to access the system with an asset of a certain type, we can allow it. It is a value-add, not necessarily related to the user distinctly. But if you take it from the point of view of asset management, it also helps in tracking the assets, which is another interesting outcome.
View full review »The most valuable features are role-based access and identity provisioning, which allow a single point of user access to multiple places.
View full review »We had a big problem with accounts synchronization provision as we used a very old identity manager solution, and we needed to change it. Then we acquired the new CA solution and we changed the solution.
It was a big challenge to change in only four months to CA Identity Manager, but we did it. Now we have accounts synchronization and self-service password reset.
Over the next two years, we will implement a new solution with CA for the accounts to put in Identity Governance. We need to implement 70 new systems inside Identity Manager.
View full review »We are using the IDM solution for customer identification and authorization. We just started the project about a year ago. We have already implemented IDM on our website and our mobile applications. So far it's looking good. It's an interesting question because what we are getting back from our customers, they're quite afraid of what's happening because we have actually gone down from three identifiers on our website to two. In our mobile applications, we are now enabling one identifier and we have just implemented fingerprint recognition. Our customers were calling us and asking "look we are seeing cyber attacks happening, identification being stolen all over the world. How are you actually going down and using only this parameters for identification?"
I think that the CA product enables us to do that. Get more security with lesser need of user identification.
User access control.
The most valuable features of this product are the following:
- Policy Xpress
Allows for the ability to build policies triggered off of events in a codeless manner. - Separation of Duty (SOD) policies
Gives the ability to create roles and/or policies with a criteria for removal or addition of a role, policy, or an entitlement based on the user’s title as an example. - Connectors
IDM has a rich set of connectors that covers traditional on premise, SAAS related, or custom resources. IDM provides the ability to create a custom connector through its Connector Xpress module. The module itself allows one to build a connector to any resource that is either LDAP or database driven. Once again this process involves no coding for the task.
SM
Subrata Mallick
CEO at Next Generation Technocom Pvt Ltd
The product’s most valuable feature is flexibility. It can be customized as per the customer’s requirements.
View full review »PD
reviewer1663482
Delivery consultant at a computer software company with 10,001+ employees
I feel the provisioning to be done well. The model offered is very good and customizable.
View full review »RK
Rahul KS
Technologist at a healthcare company with 10,001+ employees
Writing policies and provisioning are easy.
View full review »- Governance
- Identity
The most valuable features to us are:
- Provisioning engine (on the back-end, separate from front-end components, that's part of layered architecture);
- Access-request system (to manage on- and off-boarding of users); and
- Mobile interface (ability to manage workflows and user requests from smartphone).
One of the primary features we use is the password reset. The challenge we had was that our helpdesk had to manually reset customers in the field and reset their passwords one at a time, so we implemented CA Identity Manager to allow us to automate this self service reset of passwords.
View full review »I use the user record (a permanently stored data element), self-service features (access requests, application access, remove/change users), and the rules and entitlements for users.
View full review »The product is easy to install, setup and configure. For me the ease of installation and configuration was most valuable as my experience with earlier Oracle Identity Manager products was slightly tedious. Things might be different now with Oracle products though. Also, CA provided a long list of standard connectors which did not require too much of customization and it suited well with the customer.
View full review »The valuable features are the speed and the ability to provision all of our employees. I like the usability as well.
View full review »- The user interface
- The synchronization with our HR system
It gives us the ability to automate the IAM process.
View full review »MM
MarioF Morales
General Manager at Global SEIS
The most valuable aspects of Symantec Identity Governance and Administration are all the features, it is the most complete solution on the market. It has features, such as scanners and portals, it has everything.
View full review »UA
Umair Akhlaque
Enterprise Solutions & Services Head at Duroob Technology
There are many valuable features within the solution. The product is easy to customize. It’s also highly secure.
View full review »DS
DarwinSolano
Solutions Architect at MAINT
Self-registration and self-service password management are valuable features. The role modeling feature is also very useful. It allows you to model your enterprise role.
View full review »Automated provisioning removes manual labor and manual provisioning.
View full review »We take identity management seriously and CA IDM is helping us to accomplish that goal.
We have streamlined the identity management process, but we are not completely utilizing all the features of CA IDM. This product is a milestone/cornerstone for us to accomplish our identity management goals.
The most valuable features include governance certification and creation of rules. Ones the rules are created, they're put into IdentityMinder so that IdentityMinder can use those rules to provision all the users from provisioning or de-provisioning based on HR processes to create targeted endpoints. One of the targeted endpoints is used as the authentication alteration source for CS. What Identity Governance does is that it allows us to see the full, big picture of all this inter-connectivity.
View full review »The features that I find most valuable are the creation of access and admin roles. You can also manage many different applications -- more than one hundred -- in only one box. It also adds a level of security that we didn't have previously.
View full review »WA
WaelAbdelwahab
Technical Support Manager at Future systems
I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so.
It's easy to deploy, it's two versions, the manual deployment version, if it can be prepared in clusters it'll take one or two days. But the software appliance will take from 15 to 20 minutes.
View full review »Our customers find it easy to use.
View full review »RC
Solution110c
Solution Architect with 1-10 employees
Ease of use for the configuration of provisioning accounts through an account template concept for an OOTB connector.
It does not requires an extensive programming or development background. The screen of the admin tool creates an account on the system to CA IAM, which provides it to the OOTB connector, then you can simply configure CA IAM to do the provisioning. CA IAM can help with the automation of user provisioning at the same level as the system admin.
When comparing it to other products, you can set up CA IAM in a PoC very quickly to demonstrate its provisioning capabilities.
It fits for organizations having simple, basic provisioning requirements. If your organization has complex provisioning use cases and requirements, then you must have an architect and developer on the team to help bridge the gap that CA IAM cannot provide.
View full review »The most valuable features of this product are the legacy interfacing - interfaces with our mainframe - as well as provisioning.
View full review »- User-friendly UI
- In built connectors for various endpoints
Connector Development (connector Express) and Policy Express enhanced feature which is improving every time with new releases.
View full review »As far as valuable features go, one of the first ones is self-provisioning. The best thing is that our internal employees can provision their own access using the tool rather than contacting an internal group. Its built-in workflow handles all the needed approvals before it will provision the access.
View full review »I find that the propagation of identities is what is most valuable about the solution.
View full review »Identity Policy and its Ability to support Account Provisioning to RACF and AD/Exchange.
View full review »FM
reviewer780990
Senior Manager at a tech services company with 501-1,000 employees
Word mining and risk campaigns are the most valuable features of this solution.
View full review »- Self-service
- Role-based provisioning
- Access
It has good endpoint support and endpoint connectivity to different versioning endpoints.
View full review »Policy Xpress makes modifications to how our user data is handled so easy.
View full review »Extremely good customization possible with respect to local language support.
View full review »- User provisioning
- Web services
- Group management
- Task delegation
- Access granularity
AS
Amlan Sahoo
Systems-Engineer at a tech services company with 10,001+ employees
This is the only IM solution I have come across. Using the implementation guide, I was able to implement the solution with ease. The IM is the most valuable feature to me. I also find the solution's documentation and community valuable.
View full review »The simplicity, easy installation and configuration.
View full review »Provisioning server and Policy Xpress.
View full review »
• Allows individual users to work in a controlled and secure environment, whereby user authentication, access control, password administration, and smooth workflow are ensured.
• Even if a user forgets theirs access information or password, Identity Manager helps users to restore access. This reduces the cost of help-desk support while making the daily operations much smoother.
• Large sized organizations require Identity Manager to ensure that their network and systems are secure for use or for access by delegated users.
• It ensures that business workflow is in compliance with secure standards of technology infrastructure.
View full review »
Manage access certifications for whole company in one place.
View full review »- Identity
- Lifecycle
- Provisioning
The ability to customise the screen, and create a technical solution suited to the business requirements including delegation, password management and role based access.
View full review »Connector Xpress and Policy Xpress and the new interface.
View full review »
• Identity manager enables automated processes of entitlements, management as well as deletion, and creation of user accounts.
• Access to all enterprise systems like relational databases can be managed efficiently.
• Identity manager decentralizes group membership and role management, by allowing administration of delegated users, and therefore scalability and less maintenance can be achieved.
It is flexible, reduces the costs of administration and increases accountability, improves security, and lowers help desk workloads.
View full review »
Buyer's Guide
Symantec Identity Governance and Administration
March 2024
Learn what your peers think about Symantec Identity Governance and Administration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,740 professionals have used our research since 2012.