Auditor vs One Identity Manager comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
254 views|237 comparisons
One Identity Logo
5,185 views|2,929 comparisons
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "Start with an operations team that is motivated to learn a lot in a short period of time. The longer you wait, the more expensive it will be to get the right level of expertise in this area."
  • "There are old processes that are really great for some people and look like pieces of artwork. However, the maintenance of them is really expensive."
  • "The solution is flexible, in general. You can define the parts of the solution that you want to use, and it won't affect the price."
  • "We have the premium support and are very satisfied. They are always answer our questions very quickly. For the moment, we are very satisfied, but I think it's because we are paying for the premium support."
  • "It helps us save on licenses for applications because we are following the account lifecycle, as well as account reactivation."
  • "We are paying for premium support, which is expensive. However, we do receive very good, fast support."
  • "It needs flexibility in the licensing or packaging, because you buy the entire package at once, and sometimes the customers are a bit overwhelmed with whatever they get. I would like if they could cut the licensing or packaging into somewhat smaller things."
  • "It has helped to reduce customer costs."
  • More One Identity Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:CA Auditor can be instrumental in helping users ensure compliance with various regulations. It enables users to monitor critical events such as failed logon attempts, privileged user actions, and… more »
    Top Answer:CA Auditor provides organizations with the flexibility to customize audit policies, which has been instrumental in maintaining regulatory compliance. The solution offers a range of configuration… more »
    Top Answer:CA Auditor has proven to be a valuable tool for conducting digital forensics investigations on users' mainframes. The solution allows users to perform detailed forensic analysis by providing a… more »
    Top Answer:One Identity Manager offers several features that I found advantageous compared to other tools.
    Top Answer:One Identity Manager has a reasonable price point. Given the features and functionality it provides, the cost is justified.
    Top Answer:One area where One Identity Manager could be improved is in database performance. When handling a large number of users, I believe that built-in indexing or other optimizations would be beneficial… more »
    Ranking
    5th
    out of 12 in Mainframe Security
    Views
    254
    Comparisons
    237
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    3rd
    Views
    5,185
    Comparisons
    2,929
    Reviews
    29
    Average Words per Review
    980
    Rating
    8.2
    Comparisons
    Also Known As
    CA Auditor, CA Auditor for z/OS
    Quest One Identity Manager, Dell One Identity Manager
    Learn More
    Overview

    CA Auditor for z/OS (CA Auditor) is a powerful mainframe tool architected to help you achieve and maintain compliance with the myriad regulatory requirements that govern your business and IT systems. It enables you to perform an automated technical review of the system, hardware and software environment and to identify integrity exposures in z/OS. CA Auditor is designed to help you simplify auditing activities and eliminate manual processes so that users without in-depth experience can perform an extensive operating system review.

    Auditor helps organizations ensure the security, integrity, and regulatory compliance of their mainframe environments. It provides comprehensive auditing capabilities that monitor and track user activity, system changes, and data access on the mainframe. By analyzing and reporting on these activities, Auditor helps organizations detect and respond to security threats, identify compliance violations, and investigate potential breaches or unauthorized activities.

    Auditor Features

    Auditor offers the following features:

    • Comprehensive Auditing: CA Auditor provides extensive auditing capabilities to monitor and track user activities, system changes, and data access on the mainframe.

    • Real-time Monitoring and Alerting: It offers real-time monitoring of critical events, allowing users to receive alerts and notifications when specific security incidents or policy violations occur.

    • Customizable Audit Policies: Users can define and customize audit policies based on their specific security and compliance requirements. This allows them to focus on the areas that are most critical to their organization.

    • Compliance Reporting: CA Auditor offers a wide range of pre-defined compliance reports that help users demonstrate adherence to regulatory requirements such as PCI DSS, HIPAA, SOX, and GDPR. Reports can then be customized and scheduled for automatic generation.

    • Forensic Analysis: The solution includes powerful search and analysis capabilities that enable users to perform detailed forensic investigations. This helps in identifying the root cause of security incidents and understanding the full scope of unauthorized activities.

    • Audit Trail Archiving and Retention: CA Auditor allows users to archive and retain audit trail data for long-term storage and compliance purposes. This ensures that historical audit information is available for future analysis and audit reviews.

    • Integration with SIEM Solutions: The solution can integrate with Security Information and Event Management (SIEM) systems, allowing users to consolidate and correlate mainframe audit data with data from other IT systems.

    • Role-Based Access Control: Users can define access controls and assign roles to ensure that only authorized personnel have access to sensitive audit data and system configurations.

    • Interactive Query Interface: CA Auditor offers an interactive query interface that allows users to perform ad-hoc searches and queries on the audit data, providing flexibility in analyzing specific events or patterns of activity.

    • Audit Data Visualization: The solution includes visual representation capabilities, such as charts and graphs, to present audit data in a more intuitive and easily understandable format. This helps in identifying trends, anomalies, and patterns quickly.

    • Support for Mainframe Environment: CA Auditor is specifically designed for IBM's z/OS operating system, ensuring compatibility and optimized performance in mainframe environments.

    Auditor Benefits

    Some of the benefits that Auditor provides are:

    • Enhanced security and compliance

    • Comprehensive monitoring and tracking of user activities

    • Real-time alerts for security incidents

    • Customizable audit policies

    • Pre-defined compliance reporting

    • Powerful forensic analysis capabilities

    • Integration with SIEM solutions

    • Role-based access control

    • Interactive query interface

    • Visual representation of audit data

    One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.

    Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.

    One Identity consistently provides robust security solutions that facilitate a strong secure enterprise where the users, applications, and critical data are safe and secure. The unified identity security platform provides identity governance and administration (IGA), privileged access management (PAM), active directory management and security (ADMS), and identity and access management (IAM) processes to ensure an aggressive stance on security for today’s dynamic enterprise organizations.

    One Identity is used by more than 11,000 organizations worldwide managing over five hundred million plus identities.

    One Identity Manager Features

    • Self-service options: Organizations save time and are able to get tasks completed easily. Users can request permissions or access and receive predetermined approval based on role assignments.

    • Password management: Organizations can easily reset user passwords based on established organizational protocols. Password policies can be determined according to user roles and assignments.

    • Governance: One Identity Manager offers complete visibility regarding data access, such as who has access, when the access was given, and the reasons why access was given. The solution delivers clear reporting to comply with any regulatory requirements.

    • SAP certified: Users are able to amplify existing SAP security protocols and seamlessly connect accounts under governance. One Identity Manager is a complete identity access solution.

    • Reporting: One Identity Manager delivers reliable reporting regarding user access and privileged access to an organization's network. The reporting can satisfy all government and regulatory compliance standards.

    • Connectors: One Identity Manager’s significant amount of available connectors enable organizations to easily extend identity governance to the cloud and will ensure cloud application time is minimized significantly.

    Reviews from Real Users

    The initial setup process for an employee is straightforward. We set up processes for user accounts and we can add other processes to them. Our goal is to automate all user-permission and user-administration processes with One Identity and we are doing that more and more.” - Marc H., IT Architect at a tech services company

    “The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities.” - Security Consultant at a financial services firm

    Sample Customers
    Information Not Available
    Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies
    Top Industries
    No Data Available
    REVIEWERS
    Financial Services Firm38%
    Manufacturing Company10%
    Healthcare Company10%
    Construction Company8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm13%
    Government9%
    Manufacturing Company6%
    Company Size
    No Data Available
    REVIEWERS
    Small Business29%
    Midsize Enterprise6%
    Large Enterprise65%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise14%
    Large Enterprise63%

    Auditor is ranked 5th in Mainframe Security while One Identity Manager is ranked 3rd in Identity Management (IM) with 74 reviews. Auditor is rated 0.0, while One Identity Manager is rated 8.0. On the other hand, the top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". Auditor is most compared with IBM Security zSecure, whereas One Identity Manager is most compared with SailPoint IdentityIQ, Oracle Identity Governance, Cisco ISE (Identity Services Engine), EVOLVEUM midPoint and ForgeRock.

    We monitor all Mainframe Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.