Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM).
There is a return on investment in terms of time-saving, control, and ease of manageability of the environment.
We do not contact their technical support directly because we have a service agreement already in place with them with some dedicated and some non-dedicated resources.
Tickets often bounce from person to person, requiring the sharing of information multiple times.
They often refer to internal blogs, which doesn't offer much new information and can limit our capabilities in troubleshooting.
My teammates have had good communication with Microsoft.
Since it is a cloud computing product, it can accommodate a range of company sizes, from a few users to large businesses.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
Identity protection and trust issues, particularly in hybrid environments, could be addressed better with Microsoft Entra ID Protection.
There is no write-back feature from the cloud to local, which would allow me to use my own credentials from the cloud tenant securely.
Microsoft has not offered control over how they calculate high or low-risk scenarios.
They are lower than some of their competitors.
Entra ID Protection is not badly priced, but some clients, especially in medium to smaller scale companies in third-world countries, find it quite expensive.
The pricing for Microsoft Entra ID protection is not expensive.
Microsoft Entra ID requires additional licensing components.
Technically, the product does everything one would expect from an identity and access management platform.
Having a single sign-on feature with Entra ID ensures seamless access to various applications, even those with significant security constraints.
These features ease the job of security analysts, providing a better vision of user activities and potential risks.
The push for passwordless operation is successful with Microsoft Entra ID Protection.
Omada Identity is an identity governance and administration (IGA) solution designed to help organizations manage and secure digital identities and access across their IT environments. It focuses on enhancing security, compliance, and efficiency by automating identity management processes.
Omada Identity offers a robust set of features that streamline identity lifecycle management, access governance, and compliance reporting. It integrates with a wide range of IT systems, applications, and data sources, providing a centralized platform for managing user identities and access rights. The solution enables organizations to enforce security policies, ensure regulatory compliance, and reduce the risk of unauthorized access.
What are the critical features of Omada Identity?
What benefits or ROI items should users look for in the reviews when evaluating Omada Identity?
Omada Identity is widely adopted across various industries, including healthcare, finance, and manufacturing. In healthcare, it helps protect patient data and comply with regulations like HIPAA. In finance, it ensures compliance with SOX and other financial regulations. In manufacturing, it secures access to sensitive production data and intellectual property.
Pricing and licensing for Omada Identity are typically based on the number of users and the specific features required. Customer support is available through various channels, including online resources, support tickets, and professional services for implementation and customization.
In summary, Omada Identity is a comprehensive IGA solution that enhances security, compliance, and efficiency in managing digital identities and access.
Axiad Conductor offers a user-friendly platform for managing multifactor authentication and credential lifecycle, supporting seamless transitions to cloud environments for enhanced security compliance and access control.
Axiad Conductor stands out with intuitive management of multifactor authentication systems, assertive device lifecycle management, and a managed cloud solution that streamlines operations. It promotes user self-service for credential updates, minimizing the need for extensive training. With the capability to handle large networks, it enhances efficiency while meeting contract demands. Addressing user suggestions, plans include interface design updates and Canadian hosting, although macOS's frequent updates pose integration challenges.
What are the principal features of Axiad Conductor?
What should users look for in terms of ROI and benefits?
In diverse industries, Axiad Conductor is implemented to manage multifactor authentication and PKI elements like smart cards and YubiKeys. Organizations leverage it to ensure compliance, facilitate secure workforce access, and transition PKI systems to the cloud, handling substantial volumes of smart card and machine certificates with ease.
Microsoft Entra ID Protection enhances security with advanced identity controls and seamless integration across environments. It ensures robust protection via multifactor authentication and single sign-on capabilities, safeguarding enterprises' sensitive information efficiently.
Microsoft Entra ID Protection offers comprehensive identity management and privileged access management features, making it critical for businesses transitioning to hybrid models or cloud solutions. Utilizing multifactor authentication, single sign-on, and security policy creation, it excels in securing access across both on-premise and cloud platforms. By integrating with Microsoft Defender, it enhances security measures. While it is highly effective, areas for improvement include identity labeling, password management, and more straightforward third-party integrations. Expanding access to Mac devices and simplification of the licensing model are also areas to be addressed for improved scalability.
What are the key features of Microsoft Entra ID Protection?In industries such as finance and healthcare, entities leverage Microsoft Entra ID Protection to maintain stringent access controls, optimize privileged access management, and facilitate smooth transitions to cloud environments. They utilize its integration with Azure AD to ensure comprehensive identity protection while aligning to compliance requirements specific to their fields.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.