We performed a comparison between One Identity Manager and Symantec Identity Governance and Administration based on real PeerSpot user reviews.
Find out in this report how the two User Provisioning Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."User-friendly solution."
"Omada's most valuable aspect is its usability."
"Omada Identity Suite has a very powerful workflow engine. It is used for requesting access for approval to everything that's around Access Management and for re-certification purposes."
"When we started with identity and access management, we cleaned up and skipped 500 accounts. Therefore, there are a lot of people who are still in our system. Using this tool, we have cleaned up a lot of accounts for ourselves as well as our partners and suppliers. So, we can manage everything now."
"The administrative features and SoD are valuable."
"The most valuable feature in Omada is the governance. We work with other products and other product vendors, but the sweet spot in the market for Omada is where things are heavy on governance."
"The most valuable feature of Omada is its API connectivity, which allows seamless integration with various services like SAP, GRC, and Microsoft licenses."
"Omada offers a technical solution that addresses both our needs."
"It is easy to extend the product for custom purposes."
"The solution is a typical, conventional IGA but the tool itself offers many options for customization."
"The most valuable feature of One Identity Manager is its object-oriented architecture."
"In terms of what I found most valuable in One Identity Manager, it's the only product where the workflow and the catalog can be configured on roles or by business people. You don't need to know the technology at all to configure that, so this is the product's biggest advantage as well as its strongest feature. One Identity Manager is also business-oriented and IAM administrator-oriented."
"The policy and role management features are superb. If you have a customer who is willing to go somewhere with role management, then the possibilities are endless with the product. It is well-structured, and the architecture is well-defined."
"The solution offers good integration with other environments such as SAP and Active Directory, et cetera."
"One Identity Manager connects SAP accounts to employee identities under governance. The connector from One Identity for SAP is the most powerful one in the market. This connector can touch all the levels of the objects in SAP. It can not only be connected to SAP ERP but also to SAP HANA, GRC, etc. One of the strengths of One Identity Manager is the SAP connector. You can touch a lot of the SAP environment and also have deep granularity."
"The company policies feature is really good because in workflows you can check whether the policies are all working."
"The most valuable features are role-based access and identity provisioning, which allow a single point of user access to multiple places."
"It is easy to use, and does not requires an extensive programming or development background."
"Word mining and risk campaigns are the most valuable features of this solution."
"Governance."
"Connector Xpress and Policy Xpress and the new interface."
"Automated provisioning removes manual labor and manual provisioning."
"The product is relatively easier to use than other identity management products."
"The most valuable aspects of Symantec Identity Governance and Administration are all the features, it is the most complete solution on the market. It has features, such as scanners and portals, it has everything."
"The web GUI can be improved."
"Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues."
"The architecture of the entire system should also be less complex. The way they process the data is complex."
"There's a challenge with handling large amounts of data in this system."
"I would like to search on date fields, which is not possible now."
"We are trying to use Omada's standards and to adapt our processes. But we have had some trouble with the bad documentation. This is something that they could improve on. It has not been possible for us to analyze some of the problems so far, based on the documentation. We always need consultants. The documentation should include some implementation hints and some guidelines for implementing the processes."
"The user interface should have a more flexible design, where you can change it to your requirement."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"Improvements in documentation would be beneficial."
"One area that could be improved is the speed of performance - it's often a bit slower because of the size of its database."
"It is a very powerful solution, but when it comes to doing some complex parameterization or authorization, we end up coding. Comparatively, CA solutions require less coding. It is more powerful than the CA solutions, but you end up with coding in VB.Net or C#. Complex parameterization could be better from their side."
"There are a few aspects of One Identity Manager's user experience that could be improved."
"The philosophy behind One Identity Manager has always been that there's not one way of working and that you can set it up according to your own identity and access management philosophy, but what would make it better is by shortening the setup time and the learning curve time. If the team could create some best practices with a wizard to set the solution up within companies, that would be a killer feature and would help make identity access management more approachable. That would also help companies that don't have the resources or a dedicated team to set up One Identity Manager. What I'd like to see in the next release of the solution is the addition of just released application governance parts. That would sound promising. It would also be interesting if the team sets up best practice startup wizards, so you could set up One Identity Manager according to selectable best practice wizards instead of setting it up completely by yourself."
"It is a large solution where you need to learn how to work in a certain way for it to provide the best benefit."
"A room for improvement in One Identity Manager is its analytics. Though it's getting better from version to version, the analytics feature still needs improvement. I would appreciate more analytical features in the next release of One Identity Manager, so I can do a better analysis. Another vendor, for example, has a self-certification system where you can send people, then create a type of profile or screen for each person, and the person can see his entitlement and the risks behind that entitlement, so then the person makes a decision on whether he wants to keep or let go of it, and that's an out-of-the-box feature that would be good to see in One Identity Manager. Another feature I'd like to see in One Identity Manager that would be very interesting is integration with SIEM or any log collection product for both access and usage. For example, I'd be able to see that I have access to a particular application and also get information on how many times I've accessed it in the last year, last few months, etc. It's a feature that would be great to have in One Identity Manager."
"Make the logging and debugging easier to find, because I'm always confused, "Where do I have to go to turn this log on if I want to see it?""
"In the next release, there should be provisioning of your certifications."
"The directory has room for improvement. Also, the dashboards and, in particular, the KPI dashboard that shows the current user’s information needs reworking."
"Although the capabilities are there, the user interface needs to be redesigned and the opportunities for integration should be improved."
"It has a large footprint which you'd expect to be much, much smaller. Just to run basic services, we have 10 different servers. Also, if it were easier to manage, that'd be useful."
"The product has a lot of need for improvement. Our issues are being raised back to the vendor as enhancements."
"We would like to see integration with analytics. Also, for them to be more efficient regarding discovering and implementing new rules."
"Reporting could be improved."
"The product works slowly while accessing cloud-native solutions."
More Symantec Identity Governance and Administration Pricing and Cost Advice →
One Identity Manager is ranked 2nd in User Provisioning Software with 74 reviews while Symantec Identity Governance and Administration is ranked 9th in User Provisioning Software with 65 reviews. One Identity Manager is rated 8.0, while Symantec Identity Governance and Administration is rated 7.6. The top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". On the other hand, the top reviewer of Symantec Identity Governance and Administration writes "Works well on-premises and has partial capabilities but lacks many feaures". One Identity Manager is most compared with SailPoint IdentityIQ, Oracle Identity Governance, EVOLVEUM midPoint, Cisco ISE (Identity Services Engine) and Saviynt, whereas Symantec Identity Governance and Administration is most compared with SailPoint IdentityIQ, AlertEnterprise Enterprise Guardian, Microsoft Identity Manager, SAP Identity Management and Cisco ISE (Identity Services Engine). See our One Identity Manager vs. Symantec Identity Governance and Administration report.
See our list of best User Provisioning Software vendors and best Identity Management (IM) vendors.
We monitor all User Provisioning Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.