NetIQ Access Manager vs Safe-T Secure Application Access comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between NetIQ Access Manager and Safe-T Secure Application Access based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management.
To learn more, read our detailed Access Management Report (Updated: April 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's very easy to integrate with applications.""The most valuable features of NetIQ Access Manager are SSO and Multi-Factor Authentication.""The features that we have found most valuable with NetIQ Access Manager are its single sign-on and two factor two second factor database.""The single sign-on feature is excellent.""There are lots of options to customize the solution to your needs."

More NetIQ Access Manager Pros →

"Safe-T is very good for users because it has plug-in for Outlook.""It's easy to use over the web. A user who is not in the office can use it and securely insert files.""the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure.""If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"

More Safe-T Secure Application Access Pros →

Cons
"Classification of junctions and new versions of applications, such as APIs, can be added to enable the use of more devices that utilize biometrics for Multi-Factor Authentication to improve the solution.""I would love to see the upgrade procedure handled more effectively. I would prefer to have OVS installation possibilities, although the upgrade procedures should include the OS as well. You should be able to use the whole application as an appliance.""Having the ability to easily extract and view and compare and version control configurations would be ideal.""In terms of what could be improved, I would say the security of the infrastructure and the server and the working networking device.""The application portal could be improved with more options and easier customization."

More NetIQ Access Manager Cons →

"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents.""The Outlook agent is not working well for installing it in the entire office."

More Safe-T Secure Application Access Cons →

Pricing and Cost Advice
  • "The price of the solution is average."
  • More NetIQ Access Manager Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Access Management solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable features of NetIQ Access Manager are SSO and Multi-Factor Authentication.
    Top Answer:The number of legacy applications and classifications has room for improvement. Classification of junctions and new versions of applications, such as APIs, can be added to enable the use of more… more »
    Top Answer:I use NetIQ Access Manager to protect one single application with Multi-Factor Authentication. The solution is deployed on both cloud and on-prem.
    Ask a question

    Earn 20 points

    Ranking
    14th
    out of 37 in Access Management
    Views
    599
    Comparisons
    411
    Reviews
    2
    Average Words per Review
    842
    Rating
    8.5
    27th
    out of 37 in Access Management
    Views
    71
    Comparisons
    55
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Safe-T SDA, Safe-T, Safe-T Software-Defined Access
    Learn More
    Overview
    Access Manager provides a simple yet secure and scalable solution that can handle all your web access needs both internal as well as in the cloud.



    Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

    Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

    This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

    Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

    With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

    At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

    Sample Customers
    Bancomext, Bouwend Nederland, Camera dei Deputati, CGT, Coopservice Group, Court of Appeals of Georgia, Etnic, European Automotive Manufacturer, FDM Document Dynamics, Hainan Province Information Center, Highland Community College, Huntington Bank, Johnsonville Sausage, London School of Hygiene & Tropical Medicine, Mazars, Mexico's Tax Administration Service, Owens Community College, Pasco Risk, RDC, School District of Hartford, Senckenberg Nature Research Society, Sheetz, Spanish Public Employment Service, SUNY Orange County Community College, Swisscard, The Municipality of Siena, The University of Westminster, UMB Financial Corporation Invests in Identity Management, University of Dayton, University of Groningen, Vodacom, World Wide Technology
    Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
    Top Industries
    VISITORS READING REVIEWS
    Educational Organization13%
    Government11%
    Comms Service Provider11%
    Financial Services Firm10%
    No Data Available
    Company Size
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise23%
    Large Enterprise59%
    No Data Available
    Buyer's Guide
    Access Management
    April 2024
    Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management. Updated: April 2024.
    771,157 professionals have used our research since 2012.

    NetIQ Access Manager is ranked 14th in Access Management with 5 reviews while Safe-T Secure Application Access is ranked 27th in Access Management. NetIQ Access Manager is rated 8.0, while Safe-T Secure Application Access is rated 7.8. The top reviewer of NetIQ Access Manager writes "A mature, powerful product with good integration capabilities". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". NetIQ Access Manager is most compared with Okta Workforce Identity, CyberArk Privileged Access Manager, Microsoft Entra ID, Auth0 and Symantec Siteminder, whereas Safe-T Secure Application Access is most compared with .

    See our list of best Access Management vendors.

    We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.