IT Central Station is now PeerSpot: Here's why

Top 8 Identity Management (IM)

SailPoint IdentityIQOne Identity ManagerOmada IdentitySaviyntForgeRockSymantec Identity Governance and AdministrationMicrosoft Identity ManagerOracle Identity Governance
  1. leader badge
    The initial setup isn't so difficult. The most valuable features of SailPoint IdentityIQ are the reporting because it is better than other solutions. The workflows can be customized to our requirements and the overall features are good.
  2. In terms of what the most valuable feature of One Identity Manager is, that would be hard to say because the tool is great overall. There's not really one feature you'd prefer over other features, but what's really great, in my opinion, is the fact that the provisioning is really stable and accurate, and it's a process my company trusts. This means that without a lot of maintenance, I can be pretty sure that as soon as my alternative source gives a new identity or gives new information about a particular identity, everything will be transformed and executed the right way. My company has tried other solutions and there's always a struggle with the provisioning system in terms of knowing what systems work, but with One Identity Manager, this issue doesn't happen. It's also a stable system which I like.
  3. Buyer's Guide
    Identity Management (IM)
    July 2022
    Find out what your peers are saying about SailPoint, One Identity, Omada and others in Identity Management (IM). Updated: July 2022.
    620,600 professionals have used our research since 2012.
  4. The best feature in Omada Identity is that it enables us to implement standardized employee life cycle processes so that we don't have to create them ourselves. We can then use the standard workflows. The breadth and scope of the solution’s IGA features also fulfill our requirements.
  5. The most valuable features of Saviynt are database utility and report generation. These two features have a major impact, particularly when you are trying to create a report because, in other systems, you need to use a third-party utility such as a BI tool or any other reporting tool to fetch the data and send out the report to a third party team. In Saviynt, it's a system within a system, so you don't have to use any third-party tool because you can directly do your query and write that code on Saviynt and then send that report to the team.
  6. The solution is very scalable. We have a lot of users that have been increasing over the years that we have been using it. We have approximately 20,000 users.
  7. The most valuable aspects of Symantec Identity Governance and Administration are all the features, it is the most complete solution on the market. It has features, such as scanners and portals, it has everything.
  8. report
    Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
    620,600 professionals have used our research since 2012.
  9. What makes this solution attractive is the licensing model. Microsoft Identity Manager is included in premium versions of Azure AD and in enterprise agreements such as E3. This makes the solution very attractive to many of our clients who are subscribed to those products.
  10. What I like most about Oracle Identity Governance is that it is a very flexible tool. It allows you to do any customization on Java as it is built on Java and you can write any customization code using Java. I also like that Oracle Identity Governance is pretty much stable. In my company, there are a lot of users, so my company prefers this solution.

Advice From The Community

Read answers to top Identity Management (IM) questions. 620,600 professionals have gotten help from our community of experts.
Mauricio Marinho - PeerSpot reviewer
Mauricio Marinho
IT Analyst at a financial services firm with 1,001-5,000 employees
I have more than seven years of experience working at a bank.  We bought SAP GRC that came with SAP IDM. Should we leverage SAP IDM and customize it for legacy or should we acquire a specialized legacy IDM solution? Which is the best option and which solution would you recommend? Thanks! I appr...
Read More »
it_user1123740 - PeerSpot reviewer
it_user1123740If you are looking for an SAP Certified IAM solution then I suggest One… more »
6 Answers
Rony_Sklar - PeerSpot reviewer
PeerSpot (formerly IT Central Station)

Why Identity governance and administration are considered so important in enterprise IT management?

How can Identity Management (IM) tools help manage IGA better?

Efrén Yanez - PeerSpot reviewer
Efrén YanezWhy is identity governance and administration (IGA) important? By definition… more »
2 Answers
Rony_Sklar - PeerSpot reviewer
PeerSpot (formerly IT Central Station)
May 24 2022

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh Anand - PeerSpot reviewer
Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
5 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
May 20 2022

Hi infosec professionals,

Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?

Thanks for your help in educating our community!

Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIdentity and access management in the cloud - there are more interpretations of… more »
6 Answers
Ram Chenna - PeerSpot reviewer
Ram Chenna
Enterprise Architect at Blueray Digital Services
May 19 2022
Hello everyone, We are working with an retail client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such as Payment Ga...
Read More »
Joanna Stevens - PeerSpot reviewer
Joanna Stevens@Ram Chenna ​Hi Ram! I would suggest that this is a great place to start… more »
13 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
2 Answers
Amimesh Anand - PeerSpot reviewer
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?
Read More »
Samuel Paul - PeerSpot reviewer
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
5 Answers

Identity Management (IM) Articles

Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privileged identity management, privileged access management, and identity and access management. Oftentimes, they also believe that privileged access management (PAM) and privileged account management (al...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone ...
Read More »
Abhirup Sarkar - PeerSpot reviewer
Abhirup Sarkar
Director, Middle East, East India & SAARC at a tech company with 51-200 employees
Zero Trust is a set of techniques to secure end-to-end IT network infrastructure. Given the complexity of today’s networks, Zero Trust security principles continue to evolve and adapt to current demands. As indicated by the history of Zero Trust, an evolving IT security landscape was what had ev...
Read More »
Rony_Sklar - PeerSpot reviewer
PeerSpot (formerly IT Central Station)
Members of the IT Central Station community are always happy to take a few minutes to help other users by answering questions posted on our site. In this Q&A round-up, we’re focusing on our users’ answers about SIEM, Identity and Access Management, and the Differences between Hyper-conv...
Read More »
Rony_Sklar - PeerSpot reviewer
Rony_Sklar@Himanshu Shah ​@Consulta85d2 ​@Aji Joseph ​@Mark Adams ​@Steffen Hornung ​@Dan… more »
1 Comment

Identity Management (IM) Topics

What is a role in identity management?

In identity management, roles refer to a set of predefined parameters that help manage and control which access is granted to users. Role-based access control (RBAC) identifies when a user joins or changes a role in an enterprise or if a job role has been updated, alerting IT teams to adjust access rights if a role change warrants it.

What are the components of identity management?

Identity management is made up of several different components:

  • Protection of data: Sensitive data is protected within a system and also secured by the system itself.
  • Identification: IAM determines how users are identified in a system through the use of identity management as well as authentication.
  • Roles: Another component of identity management is how the system identifies roles and assigns them to individuals
  • Groups vs. individuals: Different levels of access are granted to individuals vs. groups.
  • Adding, removing, and updating: It is typical for roles in a system to frequently change. In some cases, roles are added or removed and in other instances, roles change and access rights and permissions need to be updated.
What is the difference between IDM and IAM?

IAM (identity and access management) refers to the access management controls such as the decision to block or allow users from having access rights to a specific database, sensitive information, other resources, etc. It does this via portals connected to login pages or protocols while also validating whether the individual who is requesting access actually deserves the rights to access in the first place. This differs from authentication because while authentication can identify a user, it can not determine whether they should or should not have access. In other words, IAM handles authorization rather than authentication.

On the other hand, Identity management, or IDM, manages digital identities. IDM works by creating unique designations for users by combining digital attributes and entries in a database. IDM systems create, maintain, monitor, and also delete identities within an enterprise network. They manage authentication and help businesses ensure that users have the correct permissions they need to perform their job responsibilities.

What are identity management products?

Identity management products are systems or technologies that are designed to simplify user provisioning and also an account setup process. These products focus on decreasing the amount of time it takes to complete such processes by using a controlled workflow that reduces errors while simultaneously allowing automated account fulfillment. A good identity management product should provide administrators with the ability to instantly view, modify, and monitor roles and access rights for all users. To efficiently manage access rights, an IAM system should have a solid central directory that automatically matches job titles and other business unit identifiers, along with their locations with their relevant privilege levels.

According to IT Central Station (soon to be Peerspot) users, key aspects of I&A solutions to consider include: multi-platform support, robustness, integration options, stability, automation options, and SDK availability.

Identity Management Tools Benefits

Benefits of identity management tools include:

  • Secure access: By having role-based access control, organizations can ensure the protection and transparency of all access rights, both within a corporate network and in the cloud.
  • Efficiency: IAM systems are composed of integral components that boost efficiencies, such as fully automated management of a user’s lifecycle, complete role-based access control, user data imports, application integration, workflows, and self-service.
  • Centralized system: As your enterprise scales, it can be challenging to keep track of what’s going on with multiple users, databases, portals, applications, etc. Having an IAM system allows you to have a complete 360-degree view all from a single, centralized location with increased visibility. This way, you can easily see all users in the organization along with which user identities have which user permissions and access rights.
  • Onboarding and offboarding automation: With an IAM solution, your IT team no longer needs to manually assess which permissions or privileges to grant users based on their unique user roles. Your IAM system can quickly automate this process, eliminating the margin of error associated with manual provisioning, saving your IT department time and money, and helping them deprovision users quickly if they migrate or leave to another department within the company.
  • Compliance: Regulations are constantly changing. An IAM tool will help your organization centrally manage onboarding, offboarding, access certifications, separation of duties violations, and much more so that you are prepared when and if new regulations arise.
  • Multi-factor authentication: By implementing an access management solution, you gain an extra layer of security. Poor or weak passwords can often be the reason hackers can successfully generate data attacks or breaches. With multi-factor authentication, accounts and customers are dually secured when passwords are required to be paired with an additional security step like facial recognition software, a fingerprint, a verification code sent to your mobile device, or a push notification.
  • Seamless user experience: With an identity management system in place, you can enable access to applications and/or resources - whether on-premise, in the cloud, or in a hybrid cloud - providing administrators, consumers, and enterprise users with the seamless experience they expect.
Identity Management Tools Features

Some of the main features included with identity management tools are:

  • Access control
  • Single sign-on
  • Workflow automation
  • Cloud computing
  • Password manager
  • Digital identity management
  • Provisioning
Buyer's Guide
Identity Management (IM)
July 2022
Find out what your peers are saying about SailPoint, One Identity, Omada and others in Identity Management (IM). Updated: July 2022.
620,600 professionals have used our research since 2012.