Top 8 Identity Management (IM) Tools
SailPoint IdentityIQForgeRockOmada IdentitySymantec Identity Governance and AdministrationSaviyntOne Identity ManagerOracle Identity GovernanceMicrosoft Identity Manager
Deployment takes a bit of time, however, once it's done properly, everything becomes very organized and easy to use.
Its customization is valuable. We can adapt the product to our actual needs.
The solution is very scalable. We have a lot of users that have been increasing over the years that we have been using it. We have approximately 20,000 users.
The Governance and self-service that can be set up so you can use them yourself to work in the system are the most valuable features. End users can be enabled to help themselves.
The solution is easy to scale.
Self-registration and self-service password management are valuable features. The role modeling feature is also very useful. It allows you to model your enterprise role.
We have found the implementation process to be very easy.
Saviynt has a lot of potential with many features available for users.
We have been able to make our help desk self-sufficient by giving them role-based access. We have been able to reduce service dependency by 40% to 50%.
It's a stable and scalable solution.
The most important feature is the connectors. Without the connectors, it can do nothing.
It is a stable product. You will experience some issues with it, but it's a good product.
Very powerful synchronization tool.
Advice From The CommunityRead answers to top Identity Management (IM) questions. 542,721 professionals have gotten help from our community of experts.
Question: How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?
I am researching identity management solutions. Who in the team should be managing the IDM product?
Hi peers, What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?