Alfredo SilvaExperience Design Lead and Strategist at a pharma/biotech company
Anonymous UserSenior Security Engineer at a tech services company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."
"Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want."
"It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly."
"Word mining and risk campaigns are the most valuable features of this solution."
"Out-of-the-box the product has a lot of opportunity for configuration and sophisticated identity management capability."
"I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so."
"There are many valuable features within the solution. The product is easy to customize. It’s also highly secure."
"It's a very useful tool that has improved our client's security, from day one."
"Self-registration and self-service password management are valuable features. The role modeling feature is also very useful. It allows you to model your enterprise role."
"The VPN we are using is good and working quite well."
"Other than it provides us with remote access, so it's fairly easy to install, fairly easy to set up, and provides us the ability to get into our corporate environment."
"The user interface should have a more flexible design, where you can change it to your requirement."
"When the re-certification process is launched that makes Omada very slow. There are performance issues in the current version."
"The Omada Identity SaaS version doesn't provide all the features Omada Identity on-premise provides."
"Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues."
"In the next release, there should be provisioning of your certifications."
"Although the capabilities are there, the user interface needs to be redesigned and the opportunities for integration should be improved."
"They should easier and better integration with other software."
"The directory has room for improvement. Also, the dashboards and, in particular, the KPI dashboard that shows the current user’s information needs reworking."
"Integration capabilities with other solutions and formats, including JSON, could be improved."
"They provide a framework to develop your own connectors. A connector is a piece of software that integrates with the solutions that are not a part of the support matrix. Currently, it is difficult to create these connectors in this solution. Other solutions, such as NetIQ Identity, provide a better way to create your own connector. Currently, there is no cloud version. It should have a cloud version."
"If they had dashboards or a report for managers or executives, then it would allow them to see the status and have it make sense to them."
"It gets out of sync with Active Directory or whatever it might be, whatever the authentication piece is on Active Directory, and they just reset it on the backend. I never have to contact the vendor."
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"It is licensed per managed user per year."
Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies.
The Symantec Identity Governance and Administration (formerly CA Identity Suite) provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the Symantec Identity Governance and Administration performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement.
While providing these business and governance-centric capabilities for business users, the Symantec Identity Governance and Administration also delivers core enterprise-grade identity management and governance capabilities, including broad provisioning support for on-premise and cloud apps, extensibility and flexibility to integrate with other IT systems and consumer-grade scale. This means organizations are not forced to choose between usability and performance. With the Symantec Identity Governance and Administration, they can have both.
Symantec VIP Access Manager is the next generation control platform that integrates Single Sign-On (SSO) with strong authentication, access control, and user management. It offers users and administrators control, convenience, and compliance for public and private cloud- based applications. Symantec VIP Access Manager solves cloud security problems using identity and/or context-based access control across multiple cloud applications. In the cloud, where a traditional enterprise perimeter doesn't exist, this solution fills the gap. Through Symantec VIP Access Manager, administrators can define policies that utilize the built-in user directory or existing identity management infrastructure to enforce security and compliance for applications without getting in the way of productivity. Symantec VIP Access Manager can also protect and consolidate access management for on-premise web applications. It also simplifies compliance auditing for cloud applications by consolidating logs across all applications it protects.
Symantec Identity Governance and Administration is ranked 5th in Identity Management (IM) with 6 reviews while Symantec VIP Access Manager is ranked 5th in Authentication Systems with 2 reviews. Symantec Identity Governance and Administration is rated 7.8, while Symantec VIP Access Manager is rated 10.0. The top reviewer of Symantec Identity Governance and Administration writes "Offers out-of-the-box connectors that have a lot of opportunities for configuration". On the other hand, the top reviewer of Symantec VIP Access Manager writes "It's fairly easy to install, fairly easy to set up, and provides us the ability to get into our corporate environment". Symantec Identity Governance and Administration is most compared with SailPoint IdentityIQ, Oracle Identity Governance, Microsoft Identity Manager, ForgeRock and IBM Security Identity Governance and Intelligence, whereas Symantec VIP Access Manager is most compared with Check Point Remote Access VPN, Microsoft Authenticator, Okta Workforce Identity, Duo Security and Cisco IOS SSL VPN.
See our list of .
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.