Oracle Identity Manager (Oracle IAM) vs. UserLock

Oracle Identity Manager (Oracle IAM) is ranked 2nd in Identity and Access Management (IAM) with 16 reviews vs UserLock which is ranked 21st in Identity and Access Management (IAM) with 1 review. The top reviewer of Oracle Identity Manager (Oracle IAM) writes "It provides a consistent user interface and technical support is good". The top reviewer of UserLock writes "Detecting and responding to security threats by blocking the user is a valuable feature". Oracle Identity Manager (Oracle IAM) is most compared with SailPoint IdentityIQ, CyberArk Privileged Access Security and ForgeRock. UserLock is most compared with CA Identity Manager (CA IAM), SailPoint IdentityIQ and Araxid.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
295,762 professionals have used our research since 2012.

Quotes From Members Comparing Oracle Identity Manager (Oracle IAM) vs. UserLock

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
Its most valuable feature is its scalability.OIM in my organization has improved its use and dependability, allowing us to pass audit each time.The proactive controls which can be configured to a granular level allowing the organization the flexibility to meet the changing demands of the workforce.It helps provision the required accesses through policies, approvals, and whatever would be the business requirement.Identifying connector framework for unifying provisioning capabilities from OIM.The most important features that have impacted our environment recently are the Single Sign-On solution, role based provisioning, and the automated provisioning of accounts to target systems.I have found the OIM Connector framework, based on ICF, to be the most valuable feature.

Read more »

Detecting and responding to security threats by blocking the user is a valuable feature.

Read more »

Cons
They need to improve their backup strategy.Automation of validation exercises performed by humans over Recon Exceptions generated as a result of an access synchronization event over a user's need for access or not.I have yet to see its full functionality exercised in my organization.I would like to see more segregation managed through Oracle Identity Manager.It would be great if the Oracle Fusion Middleware team worked on making it compatible with other application servers, as it exists in OIM9.x.t is too complex, has too many bugs, and is an immature product, even the best case, beta version.The development and the administration side could be a lot more intuitive and easier to use than it currently is, in terms of functionality and what it tries to achieve as a Single Sign-On entity for an enterprise environment.OIA needs to improve its governance features.

Read more »

Productivity monitoring could be improved.

Read more »

Pricing and Cost Advice
Oracle licenses are expensive. I suggest making pricing and licensing decisions that align with architectural requirements and the project's budget.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Identity and Access Management (IAM) solutions are best for your needs.
295,762 professionals have used our research since 2012.
Ranking
RANKING
Views
27,967
Comparisons
10,579
Reviews
16
Followers
1,152
Avg. Rating
7.3
Views
970
Comparisons
359
Reviews
1
Followers
265
Avg. Rating
10.0
Top Comparisons
Top ComparisonsSee more Oracle Identity Manager (Oracle IAM) competitors »
Compared 11% of the time.
Compared 10% of the time.
See more UserLock competitors »
Website/Video
Website/VideoOracle
IS Decisions
Overview
Overview

Oracle Identity Manager is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources. Its flexible architecture easily handles the most uncompromising and rigorous IT and business requirements -- without requiring changes to existing infrastructure, policies or procedures.

For more information on Oracle Identity Manager, visit Oracle.com

Protect, detect and react to all user's access to Microsoft Windows Server-based Networks. UserLock offers stronger security for Windows user logins, without impeding end users or frustrating IT teams. Harden your defense against unauthorized network access and compromised credentials. Access Control & Protection: Set and enforce non-intrusive, context-aware access controls that define network access conditions for all users. Detection & Response: Real-time monitoring and risk detection Tools immediately alert you to suspicious logon activity so you can take action quickly - crucially before that activity becomes a serious problem. Auditing & Reporting: Record, centralize and audit all network logon events, across the whole network for comprehensive reports and detailed insights.
OFFER
Learn more about Oracle Identity Manager (Oracle IAM)
Learn more about UserLock
Sample Customers
Sample CustomersKaiser, SaskTel, SuperValuBarclays, US Department of Justice, National Bank of Kuwait, Turkish Aerospace, New York Albany School District, Regtransfers, University of Kent, Camden City School District, Oklahoma City Public Schools, Bank of Cyprus, Detran-PE: Pernambuco State Traffic Department
Top Industries
Top Industries
REVIEWERS
Manufacturing Company
16%
Government
11%
Financial Services Firm
11%
Comms Service Provider
11%
VISITORS READING REVIEWS
Financial Services Firm
20%
Comms Service Provider
20%
Energy/Utilities Company
8%
Media Company
6%
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
20%
Midsize Enterprise
11%
Large Enterprise
68%
VISITORS READING REVIEWS
Small Business
12%
Midsize Enterprise
20%
Large Enterprise
69%
No Data Available
Find out what your peers are saying about CyberArk, Oracle, SailPoint and others in Identity and Access Management (IAM).
Download now
295,762 professionals have used our research since 2012.
We monitor all Identity and Access Management (IAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email