There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
VMware Workspace ONE is an intelligence-driven digital workspace platform that delivers any app on any device. It integrates access control, multi-platform endpoint management, and application management. With the VMware Workspace ONE platform, IT teams can deliver a digital workspace that includes the devices and apps of the company’s choice, but with security and control.
You should take out a dedicated license agreement of your MDM fleet and invest heavily in innovating in this space.
I have no opinion about the pricing of the product.
You should take out a dedicated license agreement of your MDM fleet and invest heavily in innovating in this space.
I have no opinion about the pricing of the product.
Organizations use SailPoint Identity Security Cloud for identity and access management, lifecycle management, compliance control, provisioning, password management, certifications, reporting, governance, and automation. It integrates with Active Directory, Office 365, and Workday. Valuable features include compliance, documentation, user provisioning, certification, reporting, connectors, accelerator packs, flexibility, customization, stability, and scalability.
SailPoint IIQ is the best of best. That is reflected in the pricing of the solution. The pricing is based on the number of identities.
They are expensive.
SailPoint IIQ is the best of best. That is reflected in the pricing of the solution. The pricing is based on the number of identities.
They are expensive.
Omada Identity is an identity governance and administration (IGA) solution designed to help organizations manage and secure digital identities and access across their IT environments. It focuses on enhancing security, compliance, and efficiency by automating identity management processes.
The pricing is too high for SMBs.
Omada continues to be very competitive on pricing, especially on the Omada cloud product.
The pricing is too high for SMBs.
Omada continues to be very competitive on pricing, especially on the Omada cloud product.
The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice.
The prices are slightly expensive.
The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice.
The prices are slightly expensive.
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
I would start off with a VM including the base license and scale according to the number of users you need to authenticate.
You can pay as you go with them. You purchase a base license and add to it as needed.
I would start off with a VM including the base license and scale according to the number of users you need to authenticate.
You can pay as you go with them. You purchase a base license and add to it as needed.
Saviynt is an intelligent, cloud-first identity governance & access management solution. The solution is designed to help organizations quickly scale cloud initiatives and solve security and compliance challenges. Saviynt offers identity governance, granular application access, cloud security, and privileged access to secure your company’s ecosystem and provide a seamless user experience.
If you need to make any changes then there are additional fees.
The price of the license for this product is quite expensive.
If you need to make any changes then there are additional fees.
The price of the license for this product is quite expensive.
One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.
Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.
It is a very good product but it's not the cheapest or cost-efficient.
There are old processes that are really great for some people and look like pieces of artwork. However, the maintenance of them is really expensive.
It is a very good product but it's not the cheapest or cost-efficient.
There are old processes that are really great for some people and look like pieces of artwork. However, the maintenance of them is really expensive.
The RSA SecurID Suite combines the separate disciplines of access management and authentication with identity governance and user lifecycle management into one comprehensive suite. It goes way beyond the capabilities of traditional identity and access management systems by using risk analytics to provide identity and access assurance. This helps organizations solve two fundamental challenges:
I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features.
RSA SecurID Access is expensive.
I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features.
RSA SecurID Access is expensive.
Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager. MIM helps you manage the users, credentials, policies, and access within your organization. Additionally, MIM adds a hybrid experience, privileged access management capabilities, and support for new platforms.
MIM is free with a Microsoft Azure license.
The solution is included in the Microsoft E3 license and premium subscriptions of Azure AD.
MIM is free with a Microsoft Azure license.
The solution is included in the Microsoft E3 license and premium subscriptions of Azure AD.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.
PowerBroker for a Mac client is three times the price of the Windows version.
I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.
PowerBroker for a Mac client is three times the price of the Windows version.
Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access.
The pricing is competitive in the SMA segment and runs $5-$6 per user.
The price of Azure AD is not expensive.
The pricing is competitive in the SMA segment and runs $5-$6 per user.
The price of Azure AD is not expensive.
Oracle Identity Governance (OIG) is a very versatile and robust enterprise identity management solution that offers functional and business performance competence by supplying centralized administration and total automation of identity and client provisioning events throughout the organization and user applications. Oracle Identity Governance monitors the complete identity and role process to satisfy rapidly changing business and complex compliance regulations and quickly delivers critical reporting and compliance capabilities.
Oracle licenses are expensive. I suggest making pricing and licensing decisions that align with architectural requirements and the project's budget.
The cost of support and upgrading to the next release are both expensive.
Oracle licenses are expensive. I suggest making pricing and licensing decisions that align with architectural requirements and the project's budget.
The cost of support and upgrading to the next release are both expensive.
Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities – users and workloads – actions, and resources across cloud infrastructures. It detects, right-sizes, and monitors unused and excessive permissions and enables Zero Trust security through least privilege access in Microsoft Azure, AWS, and GCP.
We are a Fortune 500 company, so we always negotiate with Microsoft.
The product cost is in the mid to high range.
We are a Fortune 500 company, so we always negotiate with Microsoft.
The product cost is in the mid to high range.
Reduce risk and centrally manage user access across your enterprise – with SAP Identity Management. The software integrates with your business processes to provide robust data and application security. Keep your operations running smoothly – and boost productivity by providing role-based user access, self-service password reset, approval workflows, and more.
The licensing cost varies depending on the specific requirements and deployment size.
I rate the solution's pricing a four out of ten.
The licensing cost varies depending on the specific requirements and deployment size.
I rate the solution's pricing a four out of ten.
You just need to be aware that the more systems you connect, the more license fees you have to pay.
The price of the solution is a bit high and could be reduced.
You just need to be aware that the more systems you connect, the more license fees you have to pay.
The price of the solution is a bit high and could be reduced.
Delinea Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
It is sad that people with a limited budget won't be able to afford it.
The price model is based on the number of devices and opposed to the number of users, and it is not very flexible.
It is sad that people with a limited budget won't be able to afford it.
The price model is based on the number of devices and opposed to the number of users, and it is not very flexible.
WSO2 Identity Server can be used to simplify identity and access management (IAM) related activities in the enterprise. The product is based on open standards and open source principles. WSO2 Identity Server comes with seamless, easy to use integration capabilities that help connect applications, user stores, directories and identity management systems.
We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers.
I have found the solutions license is priced competitively compared to others.
We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers.
I have found the solutions license is priced competitively compared to others.
Salesforce Identity provides a single, trusted identity for employees, partners, and customers, so that you can manage apps, users, and data sharing with simplicity and transparency.
On a scale of one to ten, where one is a very low price and ten is a very high price, I rate Salesforce Identity's pricing a six out of ten.
On a scale of one to ten, where one is a very low price and ten is a very high price, I rate Salesforce Identity's pricing a six out of ten.
The Symantec Identity Governance and Administration (formerly CA Identity Suite) provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the Symantec Identity Governance and Administration performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement.
Pricing and licensing models are adequate and reasonable.
Compared to other options, CA products are not that expensive.
Pricing and licensing models are adequate and reasonable.
Compared to other options, CA products are not that expensive.
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution.
Cost-wise, CA was better compared to others in the market.
The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution.
Cost-wise, CA was better compared to others in the market.
Pricing varies based on user count/number of modules you need.
I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive.
Pricing varies based on user count/number of modules you need.
I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive.
Okta Customer Identity is an identity service that enables frictionless experience, speed-to-market, centralized management, and internet-scale security. Okta Customer Identity is developer friendly and secure with minimal custom code.
Pricing might be high, but it comes down when the number of people using the product goes up.
The price of the solution is fair for what it offers.
Pricing might be high, but it comes down when the number of people using the product goes up.
The price of the solution is fair for what it offers.
SAP's Customer Data Cloud helps grow your audience and build trusted, personalized customer relationships based on transparency and personal data control.
The modern enterprise consists of both on-premise and cloud-based solutions often being utilized by users who are often geographically distributed. These users may also be a mix of employees, contractors, customers, vendors and so forth. OpenIAM Identity Governance (IGA) simplifies the way in which organizations manage identities across this complex landscape.
IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.
I would rate the price eight out of 10, with 10 as the best value for money.
I would rate the price eight out of 10, with 10 as the best value for money.
Veza Core Authorization Platform is designed to enhance visibility and control over data access while efficiently managing user permissions and identity governance. Users rely on it to streamline compliance and audit processes, ensuring robust security through zero-trust principles.
Key features include comprehensive access management capabilities, offering detailed governance over resource access, and providing transparent visibility into permissions and entitlements across applications and systems. The platform excels in seamlessly integrating with existing security and IT infrastructure, simplifying workflows. Additionally, its automation of compliance reporting and audit tasks reduces manual efforts, boosting productivity.
Organizations benefit from improved efficiency, better team collaboration, and insightful analytics, leading to time savings and resource optimization. Veza Core Authorization helps identify and mitigate risks associated with unauthorized data access, fostering a secure and compliant environment.
Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license
LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations.
LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights.
The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor.
LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India.
Improve Customer Engagement with Seamless Registration and Authentication:
Remove barriers to customer acquisition and conversion across all digital properties. Options include standard username and password, phone registration, and passwordless login.
Secure Customer Identities and Build Trust:
Create a verification process that provides an extra layer of security. Multi-factor authentication and risk-based authentication are quick and easy to set up. Meet all major regional regulations and policies with LoginRadius Cloud Storage, deployed over 29 data centers worldwide.
Leverage Identity for Growth:
A LoginRadius implementation can be up and running within a few weeks, giving an instant return on investment by saving months of time and significant resources. Cut engineering costs by up to 95% with a ready-to-deploy CIAM solution that addresses all customer identity needs in one platform.
Get a Deep Understanding of Customers with Unified Profiles:
Deploy a single customer identity to track and recognize customers at each touchpoint in their journey. Progressively gain a better understanding of how they interact with your brand so you can personalize the digital experience.
Sure, it starts when your customers click login. Strivacity lets you pick your flavor: social login, MFA, SSO, passwordless, FaceID or just a good ole’ password. But customer sign-in journeys travel further. Are you sure that user’s really who they claim? Did they approve the latest T&Cs? When they update their account … how do you tell your CRM? Strivacity lets you take care of all that – all from a single platform.
It’s the best way for Developers to embed proven identity management