

Find out in this report how the two Identity Management (IM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Without it, we would need thousands of additional people.
If you do not see it as purely an Identity Management tool but as a possibility to automate processes in the company, it provides a huge amount of value.
One Identity Manager saved us approximately thirty to forty percent in terms of time, money, and resources compared to our pre-deployment setup.
If you have outages or critical production problems, you can count on the manufacturer to help resolve the situation.
They should focus on bringing in technically skilled individuals who understand the tools and technologies involved.
Compared to my experiences with other tools, their support is exemplary.
We could handle about 1,00,000 records for different users.
I would rate its scalability as strong since we have not experienced any significant challenges.
This includes designing and implementing IAM solutions for legacy systems, cloud migrations, and multifactor authentications.
I would rate it a nine out of ten for stability.
Specifically affecting the test and development environments, not the production environment.
One Identity Manager has improved in terms of performance and added functionality.
This lack of 24-hour support is problematic from a testing and development standpoint.
It is crucial for them to expand their support team to match their product's success.
When it comes to privileged access management, we need to know who has access to what, which is the central problem we want to solve.
On-premises might incur higher costs.
We have a good enterprise license agreement, and we are very happy with what we get for the price we pay for it.
On-premises, it is cheap.
It ensures high security through multiple approval processes, preventing unauthorized access and enhancing compliance by providing time-based access for privileged accounts with proper audit trails.
It continuously monitors user behavior in real-time, triggering automated responses, and manages secure access for both on-premises and cloud applications using protocols such as SAML.
Once you have some experience, it demonstrates best practices and guides you on the correct way to use the tool.
| Product | Market Share (%) |
|---|---|
| One Identity Manager | 4.8% |
| Axiad Conductor | 0.6% |
| Other | 94.6% |
| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 18 |
| Large Enterprise | 88 |
Axiad Conductor offers intuitive management for authentication processes, streamlining tasks like YubiKeys and smart card issuance, catering to organizational needs with a user-centric approach.
Axiad Conductor facilitates credential lifecycle management and multi-factor authentication by simplifying the deployment and management of authentication devices. "One Click Issuance" ensures easy user enrollment in a cloud environment, reducing administrative burdens. While interface enhancements and authenticators' nickname features could improve usability, its approach to managing cryptographic credentials and handling smart cards and YubiKeys stands noteworthy. Although Apple's macOS changes present challenges, Canadian hosting preferences are recognized.
What are Axiad Conductor's main features?In industries where multi-factor authentication is critical, Axiad Conductor is widely implemented for internal and contractor workforce authentication, managing PKI on smart cards, and YubiKeys for VPN and local access. The ability to manage smart cards and machine certificates aids in maintaining regulatory compliance, while the transition to cloud-based certificate management streamlines operations and supports seamless integration.
One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.
Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.
One Identity consistently provides robust security solutions that facilitate a strong secure enterprise where the users, applications, and critical data are safe and secure. The unified identity security platform provides identity governance and administration (IGA), privileged access management (PAM), active directory management and security (ADMS), and identity and access management (IAM) processes to ensure an aggressive stance on security for today’s dynamic enterprise organizations.
One Identity is used by more than 11,000 organizations worldwide managing over five hundred million plus identities.
One Identity Manager Features
Reviews from Real Users
“The initial setup process for an employee is straightforward. We set up processes for user accounts and we can add other processes to them. Our goal is to automate all user-permission and user-administration processes with One Identity and we are doing that more and more.” - Marc H., IT Architect at a tech services company
“The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities.” - Security Consultant at a financial services firm
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.