We performed a comparison between CA Identity Suite [EOL] and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM)."I appreciate all the support we receive from Omada."
"The most valuable feature in Omada is the governance. We work with other products and other product vendors, but the sweet spot in the market for Omada is where things are heavy on governance."
"As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs."
"The Governance and self-service that can be set up so you can use them yourself to work in the system are the most valuable features. End users can be enabled to help themselves."
"The most valuable aspect of the product is that it is Microsoft-based and it supports all Microsoft technology."
"The administrative features and SoD are valuable."
"It has a very user-friendly interface compared to what we are used to, and it is highly configurable. In the old solution, when we needed to do something, we had to have a programmer sitting next to us, whereas, in Omada Identity, everything is configurable."
"When we started with identity and access management, we cleaned up and skipped 500 accounts. Therefore, there are a lot of people who are still in our system. Using this tool, we have cleaned up a lot of accounts for ourselves as well as our partners and suppliers. So, we can manage everything now."
"With the Virtual Appliance, combined with CA Identity Manager and GovernanceMinder as one solution, it eliminates having multiple infrastructure requirements, multiple products, and gives a holistic view of the access granting."
"You can spin up IDM or Identity Suite in a few hours and it is ready to use."
"The most valuable feature is the re-certification campaign capabilities."
"The most valuable feature is the speed of implementation. Now with the Virtual Appliance, it's much faster. In the past, to implement this kind of solution, it would take so many weeks. Now, it takes one day, or minutes, and we have the deployment ready."
"I found all of them quite valuable, especially the identity manager, governance, and identity portal. All the features are helpful."
"Nowadays it is offered as a Virtual Appliance, and that saves considerable time for installing and controlling it."
"You can do A2A integration. You can have your own script, which can then run outside of PA to retrieve the password and perform other tasks."
"It will provide us with more security."
"The DB clustering is a really good benefit of using CA PAM."
"The two factor authentication, and the single most important capability was it supported PIV and CAC as one of the two factors. That was pretty huge for us."
"Stability is solid as a rock."
"Whoever built it from the ground up, they understand how an organization is laid out."
"CA PAM is working well for us."
"We know we can scale up with what we have, and we probably will not need to buy any further appliances down the road."
"It is not possible to customize reports on Omada Identity."
"The backend is pretty good but the self-service request access screen, the GUI, needs improvement. It's an old-fashioned screen. Also, Omada has reports, but I wouldn't dare show them to the business because they look like they're from 1995. I know they are working on these things and that’s good, because they’re really needed."
"The architecture of the entire system should also be less complex. The way they process the data is complex."
"In our organization, all the data is event-driven, which means that if an attribute is changed in the source system, it can be updated within a few seconds in all end-user systems. There is room for improvement in Omada regarding that. Omada is still batch-based for some processes, so sometimes it can take an hour or even four hours before the execution is run and the update is sent."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"The web GUI can be improved."
"When making a process, you should be able to use some coding to do some advanced calculations. The calculations you can currently do are too basic. I would also like some additional script features."
"Improved traceability would be helpful for administrators. For example, let's say a user's permission is being revoked. We can only see the system that has carried out a particular action but not what triggered it. If an event definition or something has changed in the criteria for the permission being removed or something like that, we don't have immediate access to that information. It takes a little detective work."
"The documentation can be improved because sometimes we have some technical issues that were not documented and we have to rely on support to solve them. Then there are issues around getting the architecture, but it's challenging to get the architecture."
"I would like synchronization when a mapping is added between end points. Currently, the synchronization is not complete. It would be great if this synchronization happened immediately."
"If there was a seamless integration between portal and IdentityMinder, then that would help a bit."
"The connectors for the identity and governance part could use some improvement, by way of adding more areas. They need more development to cover more target applications."
"The setup is complex."
"Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint."
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
"I would like this solution to be simpler. It should have a one-click access that works together with AWS."
"The service account management functionality needs to be extended to application pools, SQL database, PowerShell scripts, service account discovery, etc."
"They should include some assignments in the test environment to explore the product's features."
"They need to have zero tier and active-active setup with zero minimum downtime, which they are working on it. "
"The response time for support could be faster. Some features should be added: cloud-based, VPN-less, more secure, and it should be adjusted in a hybrid environment."
More Symantec Privileged Access Manager Pricing and Cost Advice →
Earn 20 points
CA Identity Suite [EOL] doesn't meet the minimum requirements to be ranked in Identity Management (IM) while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. CA Identity Suite [EOL] is rated 8.2, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of CA Identity Suite [EOL] writes "Eliminates multiple infrastructure requirements and products, gives a holistic view of access granting". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". CA Identity Suite [EOL] is most compared with , whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, Delinea Secret Server and ARCON Privileged Access Management.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.