

Find out what your peers are saying about One Identity, Microsoft, SailPoint and others in Identity Management (IM).
| Product | Mindshare (%) |
|---|---|
| RSA Identity Governance and Lifecycle | 1.1% |
| Core Access Assurance Suite | 0.3% |
| Other | 98.6% |

| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 2 |
| Large Enterprise | 6 |
Core Access Assurance Suite is a comprehensive solution that helps organizations ensure compliance, manage user access, monitor security, and streamline auditing processes.
With features like robust access control, advanced analytics, and seamless integration, it revolutionizes how companies work, boosting efficiency and improving communication within teams. Users value its ability to enforce policies effectively and provide data-driven insights.
RSA Identity Governance and Lifecycle aids efficient identity management, offering synchronization with Active Directory for seamless setups and enhancing security with two-factor authentication.
RSA Identity Governance and Lifecycle streamlines identity management from initiation to off-boarding, focusing on role-based access control and application integration. Despite requiring on-premise deployment, it provides advanced policy features for segregation of duties and access management. Performance issues arise with large file sizes, and there is limited integration with some third-party applications. Users benefit from custom forms, workflows, and an intuitive portal that eases the user's experience. While improvements are needed in database integration and multi-tenant capabilities, the solution remains popular for its auditing and certification support.
What are the key features of RSA Identity Governance and Lifecycle?RSA Identity Governance and Lifecycle is utilized in sectors managing digital identities, with deployment options on AWS, either on the cloud or on-premise. It assists organizations in handling joiner, mover, and leaver processes, adapting to business-specific needs while adding authentication layers to network access.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.