We performed a comparison between CA Identity Suite [EOL] and IBM Tivoli Access Manager [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM)."The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"Omada's onboarding features reflect our processes for onboarding new employees well. That is the primary reason we use this solution. We use role-based access control. I'm not sure how much it has improved our security posture, but it's made managing identities more convenient."
"The most relevant feature is Omada's reporting engine. Omada never 'forgets' and archives every process. All steps an admin, user, or manager has executed, are recorded in Omada."
"Omada's user interface is elegant and easy to work with. I like Omada's ability to automatically generate accounts for new hires and allow them access to all required systems by established policies. Around 80 percent of workers can start working immediately on their first day without requesting further access."
"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."
"What I like most is that we can always find a solution, and we can also find the cause when something goes wrong. I like that the most because everything is in one way or another traceable. That is what I like most. I like its reliability."
"The most valuable feature for us is the ability to set up connectors to various IT systems and offer a wide range of supported connectors."
"You can make resources. You can import them from Azure or Active Directory and put them in an application. For example, if there is an application that uses a lot of Active Directory groups, you can make the groups available for people. If they need to access that application, you can tell them the resource groups you have for that application. People can do everything by themselves. They do not need anybody else. They can just go to the Omada portal, and they can do it all by themselves. That is terrific."
"With the Virtual Appliance, combined with CA Identity Manager and GovernanceMinder as one solution, it eliminates having multiple infrastructure requirements, multiple products, and gives a holistic view of the access granting."
"The most valuable feature is the speed of implementation. Now with the Virtual Appliance, it's much faster. In the past, to implement this kind of solution, it would take so many weeks. Now, it takes one day, or minutes, and we have the deployment ready."
"Nowadays it is offered as a Virtual Appliance, and that saves considerable time for installing and controlling it."
"You can spin up IDM or Identity Suite in a few hours and it is ready to use."
"I found all of them quite valuable, especially the identity manager, governance, and identity portal. All the features are helpful."
"The most valuable feature is the re-certification campaign capabilities."
"The integration effort with the end application is quite straightforward and easy."
"SAML 2.0."
"The Verify feature: A push method which customers are going for."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues."
"The UI design needs improvement. One or two years ago, Omada changed its user interface to simplify, but the simplification has not really kicked in."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"What I would most like to see added to the product is role management, especially enterprise or business role management, and the processes around that."
"The account management integration isn't bad, but it isn't plug-and-play like Microsoft Azure. You need some deep development knowledge to set up the connectors."
"The security permission inside Omada needs improvement. It's tricky to set up."
"I would like to see them expand the functionality of the tool to continue to be competitive with the monsters out there. For example, they could add functionality on the authentication side, functionality that Octa and SailPoint have. But they should do that while maintaining the same simplicity that makes Omada a product of choice today."
"The architecture of the entire system should also be less complex. The way they process the data is complex."
"I would like synchronization when a mapping is added between end points. Currently, the synchronization is not complete. It would be great if this synchronization happened immediately."
"If there was a seamless integration between portal and IdentityMinder, then that would help a bit."
"The connectors for the identity and governance part could use some improvement, by way of adding more areas. They need more development to cover more target applications."
"The documentation can be improved because sometimes we have some technical issues that were not documented and we have to rely on support to solve them. Then there are issues around getting the architecture, but it's challenging to get the architecture."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"The self-service portal needs improvement."
"Multi-factor authentication with social integration needs to improve."
More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →
Earn 20 points
Earn 20 points
CA Identity Suite [EOL] doesn't meet the minimum requirements to be ranked in Identity Management (IM) while IBM Tivoli Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Identity Management (IM). CA Identity Suite [EOL] is rated 8.2, while IBM Tivoli Access Manager [EOL] is rated 8.0. The top reviewer of CA Identity Suite [EOL] writes "Eliminates multiple infrastructure requirements and products, gives a holistic view of access granting". On the other hand, the top reviewer of IBM Tivoli Access Manager [EOL] writes "Reverse proxy means applications need only minimal changes to support SSO with ISAM". CA Identity Suite [EOL] is most compared with , whereas IBM Tivoli Access Manager [EOL] is most compared with .
See our list of best Identity Management (IM) vendors.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.