We performed a comparison between IBM Tivoli Access Manager [EOL] and Leiberman RED Identity Management [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM)."I'm not using Omada, but the interface is easy to use and gives you a solid overview of your identities."
"The thing that I find most valuable is that Omada consists of building blocks, which means that you can configure almost anything you want without using custom code, making it pretty easy to do. It's possible to connect to multiple target systems and to create one role that consists of different permissions in the different target systems. So one role in Omada can make sure that you have an account in three different systems."
"The key benefit of Omada Identity is maintaining complete control."
"For me, the best feature of Omada Identity is its web interface because it's really easy for users to understand."
"The support for the validity of the resources is valuable. The tool allows resource assignments within a validity period so that the managers do not have to remember to revoke the access once the work is done."
"The benefits of Omada Identity include a holistic way of viewing access, the ability to give people access, and automation."
"The most valuable feature of Omada is its API connectivity, which allows seamless integration with various services like SAP, GRC, and Microsoft licenses."
"The most relevant feature is Omada's reporting engine. Omada never 'forgets' and archives every process. All steps an admin, user, or manager has executed, are recorded in Omada."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"SAML 2.0."
"The Verify feature: A push method which customers are going for."
"The integration effort with the end application is quite straightforward and easy."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"It's more of a risk reduction. It takes passwords that are not being managed properly and manages them automatically which really reduces risk."
"The comprehensiveness of Omada's out-of-the-box connectors for the applications we use could be better. We are getting a new HR system called Cornerstone for which they do not have an out-of-the-box connector, so we have to take the REST connector and play around with it."
"What I would most like to see added to the product is role management, especially enterprise or business role management, and the processes around that."
"The user interface should have a more flexible design, where you can change it to your requirement."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"Improved traceability would be helpful for administrators. For example, let's say a user's permission is being revoked. We can only see the system that has carried out a particular action but not what triggered it. If an event definition or something has changed in the criteria for the permission being removed or something like that, we don't have immediate access to that information. It takes a little detective work."
"I am not working with the product, but they have this BI tool for role-based mining, and I think that should be included in the core product rather than an add-on."
"When making a process, you should be able to use some coding to do some advanced calculations. The calculations you can currently do are too basic. I would also like some additional script features."
"The Omada support response time has room for improvement."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"Multi-factor authentication with social integration needs to improve."
"The self-service portal needs improvement."
"They should improve the application password management. The capability to manage high availability application passwords is its biggest shortcoming."
More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →
Earn 20 points
Earn 20 points
IBM Tivoli Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Identity Management (IM) while Leiberman RED Identity Management [EOL] doesn't meet the minimum requirements to be ranked in Identity Management (IM). IBM Tivoli Access Manager [EOL] is rated 8.0, while Leiberman RED Identity Management [EOL] is rated 7.8. The top reviewer of IBM Tivoli Access Manager [EOL] writes "Reverse proxy means applications need only minimal changes to support SSO with ISAM". On the other hand, the top reviewer of Leiberman RED Identity Management [EOL] writes "It’s greatest ability is that it can easily randomize all local accounts on almost any endpoint". IBM Tivoli Access Manager [EOL] is most compared with , whereas Leiberman RED Identity Management [EOL] is most compared with .
See our list of best Identity Management (IM) vendors.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.