Cisco Identity Services Engine Competitors and Alternatives

Read reviews of Cisco Identity Services Engine competitors and alternatives
Real User
Information Security at ITG
Jan 10 2018

What is most valuable?

Whoever built it from the ground up, they understand how an organization is laid out. You can tell. When a user comes in, it automatically picks up their information. It is very easy to use. The interface is very friendly, colorful, and bold. I really like that. It is friendly to the users.

What needs improvement?

What PAM does is when a user signs in, or when a user gets prompted to an organization, they are classified based on what teams, job titles, and roles that they have. One feature I would like to see is instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. Let us have a reporting feature that will... more»
Real User
Security Staff Engineer at a tech vendor with 1,001-5,000 employees
Jul 16 2018

What do you think of BeyondTrust PowerBroker?

Primary Use Case We use it to limit user privileges. • Improvements to My Organization It reduces major vulnerabilities by removing local administrator privileges. • Valuable Features I like that I can remove local admin privileges from developers. • Room for Improvement It only has limited support for Mac. • Use of Solution Less than one year. • Stability Issues In version 7.3 there were driver compatibility issues with other security applications, but they were resolved very quickly by support. • Scalability Issues The BeyondInsight appliance environment is not as flexible as it should be in some designs. But overall, it’s a well-designed product. • Customer Service and Technical Support I would rate support at six out of 10. They need more people in...
Consultant
CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees
Jul 12 2017

What is most valuable?

All features of the CyberArk PAS solution are valuable. The Digital Vault is one of the key components of the solution along with many other great benefits. The highly secured vault stores the privileged account passwords and data files using... more»

How has it helped my organization?

Unmanaged, highly privileged accounts increase risks that can be exploited by attackers. The security controls defined by the organization require protection of the privileged account passwords. CyberArk helps organizations to identify,... more»

What needs improvement?

An immediate improvement was the implementation of security controls to protect, control and monitor privileged accounts through CyberArk solution.

Sign Up with Email