Most Helpful Review | ||
Use AlertEnterprise Enterprise Guardian? Share your opinion. | Use Comarch Identity and Access Management? Share your opinion. | |
Find out what your peers are saying about One Identity, SailPoint, Microsoft and others in Identity Management (IM). Updated: January 2021. 456,249 professionals have used our research since 2012. |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs. 456,249 professionals have used our research since 2012. | ||
Questions from the Community | ||
Top Answer: The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology. Top Answer: Licenses are only for installations and support problems. They are definitely additional costs. Top Answer: In terms of improvement, there are not so many out of the box connectors available in the current version. So what they… more » | Ask a question Earn 20 points | Ask a question Earn 20 points |
Popular Comparisons | ||
![]() Compared 34% of the time. ![]() Compared 25% of the time. ![]() Compared 16% of the time. ![]() Compared 7% of the time. ![]() Compared 6% of the time. | ||
Also Known As | ||
Omada Identity Suite | Enterprise Guardian | Comarch IAM |
Learn | ||
Omada Video Not Available | AlertEnterprise | Comarch |
Overview | ||
Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies. | The Enterprise Guardian Family of software products delivers enterprises, large and small, the ability to manage all of this for both Physical and Logical identity and access management. Business managers can now gauge risk and make decisions about how much access to grant certain individuals based on their roles. Active Policy Enforcement makes sure that adequate controls are in place prior to granting access across IT applications, physical facility access as well as access to operational plant systems. Enterprise Guardian delivers the most unique and comprehensive identity management platform that evaluates risk to the organization based on the type of access granted and the potential impact it could have. | Comarch Identity and Access Management (IAM) is a solution that allows full control over the access to company’s applications, VPNs and workstations. It comes with world-class methods for identity lifecycle, authentication, authorization and accountability. Its modular architecture makes it easy to adapt to specific types of organizations across hierarchies and geographies. |
Offer | ||
Learn more about Omada Identity | Learn more about AlertEnterprise Enterprise Guardian | Learn more about Comarch Identity and Access Management |
Sample Customers | ||
Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group | Akamai Technologies Inc., THQ, Clorox, Duke Energy, ERCOT, Firmenich, Hero Motocorp, Massport, Mobily, Newport, Oklahoma Gas & Electric, Peugeot, Salt River Project, Southern California Edison (SCE) | BP Global, Telefonica, Vodafone, Technicolor, Heathrow Airport |
Top Industries | ||
Computer Software Company36% Comms Service Provider18% Financial Services Firm8% Government4% | No Data Available | No Data Available |
AlertEnterprise Enterprise Guardian is ranked 24th in Identity Management (IM) while Comarch Identity and Access Management is ranked 37th in Identity Management (IM). AlertEnterprise Enterprise Guardian is rated 0.0, while Comarch Identity and Access Management is rated 0.0. On the other hand, AlertEnterprise Enterprise Guardian is most compared with , whereas Comarch Identity and Access Management is most compared with .
See our list of best Identity Management (IM) vendors.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.