Oracle Access Manager and UserLock are two prominent IAM solutions. Oracle Access Manager leads in deployment flexibility and enterprise features, while UserLock excels in simplicity and usability.
Features: Oracle Access Manager is praised for its comprehensive security and integration features. Its robust policy enforcement and centralized access management are highly valued. UserLock stands out for its easy-to-use authentication and real-time monitoring capabilities. Despite having fewer features than Oracle, UserLock's efficient functionality is often highlighted by users.
Room for Improvement: Oracle Access Manager users often mention the need for a more intuitive management system, improved documentation, and better customer support responsiveness. UserLock users suggest more extensive reporting features, enhanced integration with other systems, and more flexible deployment options. The type of improvements needed between the products are different.
Ease of Deployment and Customer Service: Users find Oracle Access Manager's deployment to be complex and time-consuming, often requiring expert assistance. UserLock is noted for its straightforward and quick deployment process. Both products get mixed feedback on customer service, with Oracle Access Manager users seeking faster response times and UserLock users desiring more advanced solutions from the support team.
Pricing and ROI: Oracle Access Manager has a higher initial setup cost compared to UserLock. Both products offer significant ROI, but UserLock is frequently noted as providing substantial value for the money due to its lower setup cost and efficient feature set. Users typically feel that UserLock offers better financial returns over time.
Two Factor Authentication & Access Management for Windows Active Directory.
UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
Two Factor Authentication on Windows logon, RDP, IIS and VPN connections. UserLock supports 2FA using authenticator applications which include Google Authenticator, Microsoft Authenticator and LastPass Authenticator, or programmable hardware tokens such as YubiKey and Token2.
Single Sign-On: Secure and frictionless access to Microsoft 365 and other Cloud Applications, using on-premise Active Directory credentials.
Access Restrictions: Using the contextual information around a user’s logon, UserLock will authorize, deny or limit how a user can access the network, once authenticated.
Access Monitoring: Track and alert on all users’ logon and logoff activity in real-time. Interact remotely with any session and respond to login behavior.
Access Auditing: Record and report on all user connection events to provide a central audit across the whole network.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.