We just raised a $30M Series A: Read our story

Compare Akamai Identity Cloud vs. SAP Customer Identity and Access Management

Cancel
You must select at least 2 products to compare!
Top Review
Find out what your peers are saying about ForgeRock, Auth0, Omada and others in Customer Identity and Access Management. Updated: September 2021.
542,029 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high.""It is licensed per managed user per year.""There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing.""It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive.""From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses and maintenance on licenses."

More Omada Identity Pricing and Cost Advice »

Information Not Available
Information Not Available
report
Use our free recommendation engine to learn which Customer Identity and Access Management solutions are best for your needs.
542,029 professionals have used our research since 2012.
Questions from the Community
Top Answer: Omada Identity Suite has a very powerful workflow engine. It is used for requesting access for approval to everything… more »
Top Answer: From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses… more »
Top Answer: What I would most like to see added to the product is role management, especially enterprise or business role… more »
Ask a question

Earn 20 points

Top Answer: The most valuable aspect of the product is the provisioning of a lot of SAP systems. It offers automated provisioning.
Top Answer: The automated provisioning only works well with the SAP products and there are some problems with the non-SAP products… more »
Top Answer: We are a partner. I'm working for a consulting firm and we provide our services. While we mostly deal with hybrid cloud… more »
Comparisons
Also Known As
Omada Identity Suite
Learn More
Omada
Video Not Available
Overview

Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies.

Security Monitoring, Blocking, and Fraud Protections
Akamai Identity Cloud continuously monitors our production environments for the state and health of the Akamai Identity Cloud platform. We gather detailed key performance indicator (KPI) metrics on uptime and availability for every service. Abnormalities trigger alerts to the Network Operations Command Center (NOCC) staff, on-call 24/7/365.

Brute Force Attacks (Account Takeovers)
Akamai Identity Cloud offers account-locking functionality to protect against brute force password attempts. After a specific number of failed attempts from a user, Akamai Identity Cloud locks an account. This feature is completely customizable Customers determine when and how to block additional login attempts. In addition, the Akamai Identity Cloud offers CAPTCHA- and SMS-based authentication options. Customers can choose to implement these for step-up authentication at any login attempt threshold.

Advanced Persistent Distributed Attacks
Akamai Identity Cloud has experience in successfully staving off distributed attacks. By proactively monitoring for bots/malicious activity — correlating dozens of custom metrics specific to login and registration — we can block the numerous sets of dynamic IPs that malicious actors spin during an attack.

Through IP-blocking and whitelisting, Akamai Identity Cloud can ensure that access is granted only when authorized. For example, Akamai Identity Cloud can identify IP addresses from specific countries or regions and block them from registering and/or logging in on a per customer choice (geoblocking). It can also block specific lists of IP addresses (e.g., lists of known bad IP addresses and black hat-associated IP addresses). If IP addresses are legitimate but exceptions to standard rules, or if they’ve been erroneously added to blacklists, Akamai Identity Cloud can whitelist them ensuring that IP addresses on this list are always accepted.

Denial-of-Service Attacks
Online Business Systems, Inc., an external third-party penetration testing firm, tested Akamai Identity Cloud’s ability to withstand DoS attacks. Bot mitigation strategies include rate limiting to mitigate bot DoS attacks, reCAPTCHA to mitigate bots that create fake user profiles, and both client- and server-side validation to ensure that all field values are legitimate.

Trend Monitoring
Akamai Identity Cloud employs custom API monitoring on a per-customer basis to establish trends in usage as well as to identify and block abnormal usage patterns. It is proven to successfully identify and mitigate malicious activity on behalf of Akamai Identity Cloud customers. And because each customer is unique, Akamai Identity Cloud can implement alerting and blocking rules that reflect inherent trend differentiations.

Adjusting a customers custom blocking rules is a collaborative process between Akamai Identity Cloud and the customer. Different customers have different risk appetites and risk tolerances, and these affect trade-offs between blocking some legitimate traffic and assuming some costs of fraud. Advanced persistent attacks might involve multiple adjustments of the custom policy engine rules.

Intrusion Detection
OSSEC intrusion detection system automatically reviews logs for suspicious activity on a regular basis. New account creation fraud protections include CAPTCHA- and SMS-based authentication — options that a customer may choose to implement as a step-up authentication protection against scripted account creation attacks. Akamai Identity Cloud proactively monitors for bots/malicious activity by correlating dozens of custom metrics specific to login and registration, as well as by identifying anomalies specific to a customer’s unique traffic patterns.

Power relevant customer experiences based on first-party data. With SAP Customer Identity and Access Management solutions for B2C, you can build rich, centralized customer profiles and synchronize them with all your digital properties.

Offer
Learn more about Omada Identity
Learn more about Akamai Identity Cloud
Learn more about SAP Customer Identity and Access Management
Sample Customers
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group
Best Buy, Audi, Fox, IBM, Fiat, Honda
Information Not Available
Top Industries
REVIEWERS
Government44%
Computer Software Company22%
Mining And Metals Company11%
Financial Services Firm11%
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider12%
Government7%
Financial Services Firm7%
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider13%
Insurance Company6%
Government6%
No Data Available
Company Size
REVIEWERS
Small Business25%
Large Enterprise75%
No Data Available
No Data Available
Find out what your peers are saying about ForgeRock, Auth0, Omada and others in Customer Identity and Access Management. Updated: September 2021.
542,029 professionals have used our research since 2012.

Akamai Identity Cloud is ranked 12th in Customer Identity and Access Management while SAP Customer Identity and Access Management is ranked 8th in Customer Identity and Access Management with 1 review. Akamai Identity Cloud is rated 0.0, while SAP Customer Identity and Access Management is rated 8.0. On the other hand, the top reviewer of SAP Customer Identity and Access Management writes "Good automated provisioning, integrates well with other SAP systems, and works well with Microsoft's Active Directory". Akamai Identity Cloud is most compared with Auth0, PingFederate and Okta Customer Identity, whereas SAP Customer Identity and Access Management is most compared with .

See our list of best Customer Identity and Access Management vendors.

We monitor all Customer Identity and Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.