Most Helpful Review
The data can be manipulated using SQL queries and commands. There are too many configuration interfaces.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Quest One IDM allows for large customization.
The Data Importer is a great tool to create an ETL. It generates code which is easy to maintain later without the tool.
Detecting and responding to security threats by blocking the user is a valuable feature.
Quest Software should provide notes and documents to customers before they buy the product and license.
Some internal structures are in place because of already depreciated functions back from the time when the solution was used for software deployment and as a help desk.
Productivity monitoring could be improved.
Pricing and Cost Advice
Start with an operations team that is motivated to learn a lot in a short period of time. The longer you wait, the more expensive it will be to get the right level of expertise in this area.
Information Not Available
out of 57 in Identity Management (IM)
In Identity Management (IM)
Compared 24% of the time.
Compared 16% of the time.
Compared 9% of the time.
Compared 59% of the time.
Compared 41% of the time.
Also Known As
|Quest One Identity Manager, Dell One Identity Manager|
|One Identity||IS Decisions|
One Identity Manager helps you mitigate risk, secure data, meet uptime requirements and satisfy compliance by giving your users access to data and applications they need and nothing more. IAM can be driven by business needs, not IT capabilities. With Identity Manager, you can manage user identities, privileges and security across the enterprise, putting you in control of identity management and taking the burden off your IT staff.
|Protect, detect and react to all user's access to Microsoft Windows Server-based Networks. UserLock offers stronger security for Windows user logins, without impeding end users or frustrating IT teams. Harden your defense against unauthorized network access and compromised credentials. Access Control & Protection: Set and enforce non-intrusive, context-aware access controls that define network access conditions for all users. Detection & Response: Real-time monitoring and risk detection Tools immediately alert you to suspicious logon activity so you can take action quickly - crucially before that activity becomes a serious problem. Auditing & Reporting: Record, centralize and audit all network logon events, across the whole network for comprehensive reports and detailed insights.|
Learn more about One Identity Manager
Learn more about UserLock
|Texas A&M, Sky Media, BHF Bank, Swiss Post, Union Investment, Wayne State University. More at OneIdentity.com/casestudies||Barclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department|