Compare Comarch Identity and Access Management vs. IBM Security Identity Governance and Intelligence

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about One Identity, SailPoint, Microsoft and others in Identity Management (IM). Updated: October 2020.
442,283 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
442,283 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology.
Top Answer: Licenses are only for installations and support problems. They are definitely additional costs.
Top Answer: In terms of improvement, there are not so many out of the box connectors available in the current version. So what they… more »
Ask a question

Earn 20 points

Ask a question

Earn 20 points

Popular Comparisons
Compared 14% of the time.
Also Known As
Omada Identity SuiteComarch IAMIGI, IBM Security Identity Manager, ISIM
Learn
Omada
Comarch
IBM
Overview

Omada Identity Suite Core identity management and access governance functionality in one integrated solution. High-Level Identity Management and Access Governance Functionality Omada's Identity Suite delivers a fully featured process framework for core identity management and access governance functionalities, that improves IT security, ensures compliance control, and enables business efficiency.

Comarch Identity and Access Management (IAM) is a solution that allows full control over the access to company’s applications, VPNs and workstations. It comes with world-class methods for identity lifecycle, authentication, authorization and accountability. Its modular architecture makes it easy to adapt to specific types of organizations across hierarchies and geographies.

IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

Offer
Learn more about Omada Identity
Learn more about Comarch Identity and Access Management
Learn more about IBM Security Identity Governance and Intelligence
Sample Customers
ECCO Shoes, Vattenfall, Krka, Bayer, NuStar Energy, DuPontBP Global, Telefonica, Vodafone, Technicolor, Heathrow AirportE.ON Global Commodities
Top Industries
VISITORS READING REVIEWS
Computer Software Company43%
Comms Service Provider16%
Government5%
Financial Services Firm5%
No Data Available
No Data Available
Find out what your peers are saying about One Identity, SailPoint, Microsoft and others in Identity Management (IM). Updated: October 2020.
442,283 professionals have used our research since 2012.
Comarch Identity and Access Management is ranked 36th in Identity Management (IM) while IBM Security Identity Governance and Intelligence is ranked 14th in Identity Management (IM) with 1 review. Comarch Identity and Access Management is rated 0.0, while IBM Security Identity Governance and Intelligence is rated 7.0. On the other hand, the top reviewer of IBM Security Identity Governance and Intelligence writes "Clear evaluation and life cycle management; service center could be more user friendly". Comarch Identity and Access Management is most compared with , whereas IBM Security Identity Governance and Intelligence is most compared with SailPoint IdentityIQ, CyberArk PAS, OpenIAM Identity Governance, Symantec Identity Governance and Administration and Cisco ISE (Identity Services Engine).

See our list of best Identity Management (IM) vendors.

We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.