Symantec Identity Governance and Administration Valuable Features

MostafaBasha
Operation Risk Senior Manager/CRO at I-SCORE
Out-of-the-box connectors have a lot of opportunities for configuration. The governance port and business rules are difficult. At a certain point, the product discovers dormant accounts because it monitors which accounts are active but which are not being used. So it will perform some service on these dormant accounts that are not active for six months or maybe never used before. This is a good feature. We also have a dynamic workflow, with approval stages which helps validate the ID. They have a form designer, which is good because you can create exactly what you want as far as access controls. They have value-added modules like the one they have for asset management. This means that when you are in the role of a manager in CA IDM, you are able to restrict access to certain types of laptops — maybe by mobile provider, maybe by core type. So if a user tries to access the system with an asset of a certain type, we can allow it. It is a value-add, not necessarily related to the user distinctly. But if you take it from the point of view of asset management, it also helps in tracking the assets, which is another interesting outcome. View full review »
Solution110c
Solution Architect with 1-10 employees
Ease of use for the configuration of provisioning accounts through an account template concept for an OOTB connector. It does not requires an extensive programming or development background. The screen of the admin tool creates an account on the system to CA IAM, which provides it to the OOTB connector, then you can simply configure CA IAM to do the provisioning. CA IAM can help with the automation of user provisioning at the same level as the system admin. When comparing it to other products, you can set up CA IAM in a PoC very quickly to demonstrate its provisioning capabilities. It fits for organizations having simple, basic provisioning requirements. If your organization has complex provisioning use cases and requirements, then you must have an architect and developer on the team to help bridge the gap that CA IAM cannot provide. View full review »
Umair Akhlaque
Enterprise Solutions & Services Head at Duroob Technologies
There are many valuable features within the solution. The product is easy to customize. It’s also highly secure. View full review »
Find out what your peers are saying about Broadcom, SailPoint, ForgeRock and others in Identity Management (IM). Updated: May 2020.
417,803 professionals have used our research since 2012.
WaelAbdelwahab
Technical Support Manager at Future systems
I like that it is easy to diagnose. It has a version of a virtual appliance so we can download it, run it, configure it, and it would take about 10 to 15 minutes to configure the cluster or so. It's easy to deploy, it's two versions, the manual deployment version, if it can be prepared in clusters it'll take one or two days. But the software appliance will take from 15 to 20 minutes. View full review »
reviewer780990
Senior Manager at a tech services company with 501-1,000 employees
Word mining and risk campaigns are the most valuable features of this solution. View full review »
Find out what your peers are saying about Broadcom, SailPoint, ForgeRock and others in Identity Management (IM). Updated: May 2020.
417,803 professionals have used our research since 2012.