We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The feature that we find most valuable is the ability to integrate multiple IDs for on-premises Active Directory."
"The user self-service program and the Office 365 provisioning service feature are the most valuable. It is a very easy and feature-rich solution that gives priority to the users and security."
"The solution has powerful authentification and authorization. It offers a good way to increase security."
"It's a good solution for identification and access management."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"We would like to see an improvement in the ability to manage mobile devices."
"They can include the Mobile Device Management (MDM) feature."
"Configuration could be simplified for the end-user."
"The user interface needs to be simplified, it's complex and not user-friendly."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The license and costs depend on the amount range of users you have. For just approximately 2,000 users, the price is practical and fair. However, when you have 20,000 users, it starts to become really expensive, and the discount per user is not attractive enough to go ahead and purchase."
GRANT ACCESS TO YOUR WORKFORCE. GIVE NOTHING TO ATTACKERS.
Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out.
Frictionless Sign On
Keep workers working, not logging in and out.
Make intelligent access decisions based on AI-powered analytics.
Enable access across any device, anywhere at just the right time.
IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.
CyberArk Identity is ranked 10th in Access Management with 2 reviews while IBM Security Access Manager is ranked 12th in Access Management with 3 reviews. CyberArk Identity is rated 9.0, while IBM Security Access Manager is rated 7.6. The top reviewer of CyberArk Identity writes "A stable solution for accessing on-premises active directory". On the other hand, the top reviewer of IBM Security Access Manager writes "Effortless user sign in, highly scalable, and reliable". CyberArk Identity is most compared with Azure Active Directory, Okta Workforce Identity, Microsoft Intune, SailPoint IdentityNow and LastPass Enterprise, whereas IBM Security Access Manager is most compared with Azure Active Directory, Okta Workforce Identity, ForgeRock, Oracle Access Manager and F5 Access Policy Manager. See our CyberArk Identity vs. IBM Security Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.