Try our new research platform with insights from 80,000+ expert users

AWS Identity and Access Management vs EVOLVEUM midPoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Ranking in Identity Management (IM)
4th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
51
Ranking in other categories
User Provisioning Software (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th), Customer Identity and Access Management (CIAM) (3rd)
AWS Identity and Access Man...
Ranking in Identity Management (IM)
5th
Average Rating
9.0
Reviews Sentiment
6.7
Number of Reviews
12
Ranking in other categories
Cloud Resource Access Management (4th)
EVOLVEUM midPoint
Ranking in Identity Management (IM)
13th
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Identity Management (IM) category, the mindshare of Omada Identity is 3.1%, down from 3.5% compared to the previous year. The mindshare of AWS Identity and Access Management is 0.3%, up from 0.1% compared to the previous year. The mindshare of EVOLVEUM midPoint is 2.4%, up from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Market Share Distribution
ProductMarket Share (%)
Omada Identity3.1%
AWS Identity and Access Management0.3%
EVOLVEUM midPoint2.4%
Other94.2%
Identity Management (IM)
 

Featured Reviews

Lars Henrik Jensen - PeerSpot reviewer
Faced deployment delays and daily errors but have streamlined access reviews and improved termination processes
The deployment of Omada Identity is complex; the product is not brilliantly documented, and it lacks the same level of documentation that could be found for systems such as SailPoint or Saviynt, making it harder to find material or help online, particularly with Omada Cloud. The system performance of Omada Identity is inconsistent; we've been analyzing this issue together with Omada, but we haven't been able to resolve whether the problem lies on their side or my client's side, which causes long response times and long run times in Omada sometimes. Omada Identity does not help deploy IGA within 12 weeks; the time frame for applying the rapid deployment solution was much longer than expected, and I am unsure if it is built on best practices across all systems. When we receive an error or system message from Omada Identity, it's very hard to decode what it means; we have had serious issues in daily imports that we can't explain, indicating a need for improved stability. The comprehensiveness of out-of-the-box connectors that Omada provides differs; the connectors for Microsoft and Salesforce are good, but for SAP, they are basically non-existent.
SumitMundik - PeerSpot reviewer
IAM improves cloud security management with hybrid network capabilities and global role access
In AWS Identity and Access Management solutions, CloudFormation tools are used to create templates. Having predefined templates available from the AWS team would be beneficial. Currently, security teams work on policies and scripts for creating generic AWS Identity and Access Management roles. If AWS could provide an option to automatically create templates based on desired access requirements, it would be extremely beneficial, especially for documentation and troubleshooting purposes. Storage gateway creation has limitations, allowing maximum of 50 SMB file shares per gateway. While it is costly to access S3 buckets via AWS Identity and Access Management role through storage gateway, companies invest in this for enhanced data security, particularly in financial sectors where data integrity is crucial. There is an ongoing issue where files are sometimes sent twice to S3 buckets, despite MoveIt logs showing single transmission. As a workaround, Lambda functions are implemented with a five-minute delay before processing files to downstream applications.
Ondrej Balun - PeerSpot reviewer
An open-source solution that helps in IAM
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation. Users are granted access based on predefined roles associated with their positions, organizational hierarchy, or job titles. Instead of direct assignments, users automatically receive roles upon entering the company, aligning with their assignments. The core feature of EVOLVEUM midPoint that I find most valuable is provisioning. Users, including myself, can submit requests that need designated individuals' approval. Additionally, the recertification feature is crucial for regularly reviewing and confirming the appropriateness of user access rights. I find recertifications valuable because they align with clear regulatory requirements for companies to perform them at least once yearly. Using the product, I can initiate a recertification campaign by selecting users and the applications to be recertified. I define the individuals responsible for approving or rejecting access. The goal is to ensure compliance with regulatory standards. The tool's flexibility in handling identity types and tickets has brought notable benefits. It provides full flexibility to extend attributes or the schema for users and organizations. Its audit and reporting capabilities have significantly enhanced our customer's compliance and security posture. Management's regular need for reports, such as the number of users in the application and identifying users with critical access, is addressed. The solution allows easy configuration of reports directly from the front end. Additionally, the ability to schedule and automate report execution, followed by automatic distribution to support or responsible personnel, streamlines the process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want."
"Omada's best feature is creating accounts, automatically assigning permissions, and distributing resources based on assignment policies."
"Omada Identity has helped us consolidate solutions for access management as they provide access request concepts, access reviews, and different types of access reviews that can be used."
"Omada Identity helps automate reviews of access requests, generating an approval for the manager immediately when a request is created, so that process doesn't take long."
"Its best feature is definitely the process design. It is quite easy and straightforward to design a process."
"Omada Identity Suite has a very powerful workflow engine. It is used for requesting access for approval to everything that's around Access Management and for re-certification purposes."
"Omada Identity saves time in provisioning access for identities as it is linked to the HR system, allowing onboarding and offboarding to be done automatically; this includes the automatic creation of access roles."
"The most valuable functionality of the solution for us is that when employees stop working for the municipality, they are automatically disabled in Active Directory. Omada controls that 100 percent. They are disabled for 30 days, and after that time Omada deletes the Active Directory account. The same type of thing happens when we employ a new person. Their information is automatically imported to Omada and they are equipped with the roles and rights so they can do their jobs."
"It also provides MFA, which adds an additional layer of security."
"The most beneficial aspect of AWS Identity and Access Management is the ability to manage security."
"IAM is highly helpful for monitoring and privilege management."
"A significant advantage is that unlike access keys and secret keys that require regular changes every 30-90 days based on organizational policy, AWS Identity and Access Management roles, once set up, do not require periodic changes."
"AWS IAM is useful since it restricts unauthorized use of the AWS console."
"AWS Identity and Access Management has an intuitive user interface that is simple to use."
"The ease of control and the ability to manage group policies and individual policies are valuable features."
"AWS IAM is beneficial as it provides standard access and identity management policies and roles for monitoring and logging."
"The basic setup is straightforward and takes minutes to complete."
"I like that it's open-source, and it's working. It has nice features, and it looks like it's easy to maintain."
"Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation."
 

Cons

"The reporting and importing have room for improvement."
"It is not possible to customize reports on Omada Identity."
"The architecture of the entire system should also be less complex. The way they process the data is complex."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"The stability of Omada Identity needs improvement because we have experienced too many unexpected errors on a daily basis, causing significant trouble as we onboard more complex and business-critical systems."
"The user interface should have a more flexible design, where you can change it to your requirement."
"The comprehensiveness of Omada's out-of-the-box connectors for the applications we use could be better. We are getting a new HR system called Cornerstone for which they do not have an out-of-the-box connector, so we have to take the REST connector and play around with it."
"Omada Identity has two main issues that need to be solved or improved the most. One is its setup or installation process because it's complex and cumbersome. I'm talking about the process for on-premises deployment because I've never tried the cloud version of Omada Identity. Setting up the cloud version should be much easier. The second area for improvement in Omada Identity is that it's piggybacking on Microsoft's complex way of having all kinds of add-ons, extensions, or setups, whether small or large, such as the new SQL Server, and it's cumbersome to make sure that everything works. Omada Identity is a complex solution and could still be improved."
"The documentation and policies could be more straightforward."
"The user activity tracking in AWS Identity and Access Management should be enhanced to provide detailed descriptions of user activities."
"There is an ongoing issue where files are sometimes sent twice to S3 buckets, despite MoveIt logs showing single transmission."
"AWS IAM could be improved by providing a graphical user interface which would simplify permissions management, making it easier for beginners to quickly understand and manage permissions."
"Currently, the IAM solution does not allow one user to create multiple access and secret keys, which can be distributed in a diverse manner."
"The accessibility and inclusion of more AI features would greatly enhance the program."
"It is sometimes not always clear how to work with it, so this is not necessarily what I appreciate about it, but I think it is a matter of experience because when you have experience, it is quite intuitive."
"AWS Identity and Access Management has an intuitive user interface that is simple to use."
"One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based settings requiring a higher level of technical expertise."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"I think that the product is missing some of the identity governance functions—for example, the legal stuff and GDPR, and so on. But I think they are currently working on it."
 

Pricing and Cost Advice

"Omada is expensive."
"Omada isn't cheap or expensive. The licensing model is flexible. I've only had limited interactions with the Omada sales team, but they were positive. They don't sell the customers more licenses than they need. It's important to accurately forecast future usage. For example, we have many licenses that we don't use because we don't have the identities yet. We pay extra, which isn't good."
"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"The pricing is okay."
"Omada Identity is competitively priced and delivers good value for our money."
"Omada is too expensive. We are in the automotive industry. The pricing might be high because most of the other customers are in the insurance or banking sectors, but it's steep for an auto supply company."
"While Omada Identity carries a premium price tag, it proves to be cost-effective."
"My client deals directly with the Omada Identity team in terms of licensing. I never look at pricing, so I'm not aware of how much the solution costs, but it's worth the money. Often, when you begin to use Omada Identity and it takes a while to set up, it'll be irreversible, and you'd depend on and focus more on the functionality of the solution, rather than its price tag."
Information not available
"The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provided by the vendor."
"We're EVOLVEUM partners, and I tried it without a license."
"Licensing is defined by the number of users."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
872,706 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
9%
Government
6%
No data available
University
15%
Government
9%
Comms Service Provider
8%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise42
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise1
Large Enterprise3
No data available
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
I'm not fully aware of the pricing details, which are managed by higher management; however, the product itself is sa...
What needs improvement with Omada Identity Cloud?
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks req...
What needs improvement with AWS Identity and Access Management?
In AWS Identity and Access Management solutions, CloudFormation tools are used to create templates. Having predefined...
What is your primary use case for AWS Identity and Access Management?
When attempting to access Windows UNC paths from MoveIt, it will request user ID and access. For instance, if ITS-Mov...
What advice do you have for others considering AWS Identity and Access Management?
The AWS Identity and Access Management Access Analyzer is not utilized in our implementation. The policy simulator fe...
What do you like most about EVOLVEUM midPoint?
Our customers leverage the product as a central component in their identity field management. The process involves co...
What is your experience regarding pricing and costs for EVOLVEUM midPoint?
The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is ...
What needs improvement with EVOLVEUM midPoint?
One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Cur...
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
No data available
No data available
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
1. Amazon.com2. Adobe3. Accenture4. AT&T5. Bank of America6. Cisco Systems7. Coca-Cola8. Dell Technologies9. Equinix10. GE Healthcare11. Google12. Hewlett Packard Enterprise13. IBM14. Intel15. JPMorgan Chase16. Kroger17. LinkedIn18. Lockheed Martin19. Mastercard20. Microsoft21. Netflix22. Nike23. Oracle24. PayPal25. PwC26. SAP27. Siemens28. Spotify29. Tesla30. Toyota31. Visa32. Walmart33. World Bank
European Commisson, University of Illinois, First United Bank & Trust, Deutsche Telekom, Vodafone, Avast
Find out what your peers are saying about AWS Identity and Access Management vs. EVOLVEUM midPoint and other solutions. Updated: September 2025.
872,706 professionals have used our research since 2012.