We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"It is licensed per managed user per year."
"There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing."
"It's a fair price for the on-premises system. Compared with what we had before, it's much cheaper and we get all the modules in one. We tried to go with the cloud, but it was far too expensive."
"From an on-prem point of view, the cost is quite transparent and reasonable. The direct cost is primarily for licenses and maintenance on licenses."
Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies.
Manual intervention creates the possibility of malicious behavior. Automated provisioning will decrease your organizational risk by providing the mechanism that can enable you to restrict administrative access. And restricting administrative access is step #1 to a mature IAM Program.
Once automation is in place. The right attributes will be automatically provisioned to the correct target systems with the proper value. Attribute management is often over-looked and discarded, but without automated attribute management, the integrity of any authentication transaction is suspect.
Business Process Oversight
Every automated provisioning solution requires attributes with correct values. Bad data is 100% created by human-driven intake processes. Introduce automation to not only streamline access, but also to double check your intake processes. Bad data is not Identity’s fault, but Identity can help you fix it.
Automation creates a predictable process. Predictability is key to ultimately gaining control of your business. Automation breeds repeat-ability. Repeat-ability creates efficiency. Efficiency creates more time. More time focused on your business is what control feels like.
e-trust Horacius is ranked 22nd in User Provisioning Software while Fischer Identity Automated Provisioning is ranked 23rd in User Provisioning Software. e-trust Horacius is rated 0.0, while Fischer Identity Automated Provisioning is rated 0.0. On the other hand, e-trust Horacius is most compared with , whereas Fischer Identity Automated Provisioning is most compared with .
See our list of best User Provisioning Software vendors.
We monitor all User Provisioning Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.