One Identity Manager Questions

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Aug 01 2022

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Oct 09 2022

If you were talking to someone whose organization is considering One Identity Manager, what would you say?

How would you rate it and why? Any other tips or advice?

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Oct 09 2022

Please share with the community what you think needs improvement with One Identity Manager.

What are its weaknesses? What would you like to see changed in a future version?

it_user667554 - PeerSpot reviewer
IAM Technical Specialist at a consultancy with 10,001+ employees

We are looking at analyzing both products, from the points of:

1. Configuraitons

2. Customization

3. Support

4. Various client implementations

Can you advice or suggest your opinion?

Identity Management (IM) Questions
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Aug 10 2022
Hi infosec professionals, Based on this article, a few days ago "Twilio became aware of unauthorized access to information related to a limited number of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials". What could be done better...
Read More »
Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIn case of sophisticated social engineering attack designed to steal employee… more »
1 Answer
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jul 13 2022

Hi security professionals,

Can you please clarify the definition of the Zero Trust vs Least Privileged model? How are they different?

In which cases you'd use each of them? Please share an example.

Thanks for sharing your knowledge!

Olive Kusumbara - PeerSpot reviewer
Olive KusumbaraLeast Privilege is about giving the least privilege (role and privilege) as… more »
Adewale Oluwaseyi - PeerSpot reviewer
Adewale OluwaseyiLeast privilege access is used to provide access needed to perform a role or… more »
Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriZero Trust is the same approach for all users (for example internal and… more »
3 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

Hi infosec professionals,

Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?

Thanks for your help in educating our community!

Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIdentity and access management in the cloud - there are more interpretations of… more »
Pramod Bhaskar  - PeerSpot reviewer
Pramod Bhaskar Cloud IAM is a different beast from traditional on-premises IAM. There are… more »
Kemp Zhou - PeerSpot reviewer
Kemp ZhouCase by case, that will be the very first thing I am going to tell.  In… more »
6 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
Bruce Macdonald - PeerSpot reviewer
Bruce MacdonaldIDAM stands for Identity and Access Management. Think of this as the lifecycle… more »
2 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

Hi community,

How do you practically use it and apply Security Posture/Security Posture Management in a large organization?

Tnx.

Vishal-Goyal - PeerSpot reviewer
Vishal-GoyalSecurity posture will include a number of things. The following artifacts… more »
1 Answer
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

When should an organization use Hybrid Identity? What are the top IAM tools that support it?

Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

What is it and how can you practically use it in your organization? 

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @Evgeny Belenky ​, Cognitive security can be interpreted as the application… more »
1 Answer
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

Which modern tools would you recommend using to prevent this type of attack?

Ram Chenna - PeerSpot reviewer
Ram Chenna
Enterprise Architect at Blueray Digital Services
Hello everyone, We are working with an retail client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such as Payment Ga...
Read More »
Joanna Stevens - PeerSpot reviewer
Joanna Stevens@Ram Chenna ​Hi Ram! I would suggest that this is a great place to start… more »
John Johny Restrepo Hernández - PeerSpot reviewer
John Johny Restrepo HernándezOf course, to have the best Identity and Access Management solution it is… more »
Matt Thomson - PeerSpot reviewer
Matt Thomson@Ram Chenna ​ Sounds like there is a lot of things at play here.  I would… more »
13 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi security professionals, As the majority of you have probably heard, GoDaddy has been hacked again a few days ago. Based on what is already known, what has been done wrong and what can be done better?  Share your thoughts!
Read More »
Amimesh Anand - PeerSpot reviewer
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?
Read More »
Samuel Paul - PeerSpot reviewer
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
CaseyWhitcher - PeerSpot reviewer
CaseyWhitcherI think in your initial interview, and evaluation with the client, the necessity… more »
Jay Bretzmann - PeerSpot reviewer
Jay BretzmannWhat's the issue, expense?  How does one eliminate risk if they can't positively… more »
5 Answers
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services

Hi all,

What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.

Thanks for sharing your experience!

Evgeny Belenky - PeerSpot reviewer
Evgeny BelenkyHi @Chetan Woodun, @Felician (Felix)Farcutiu, @SIVASHANMUGAM NATARAJAN, @John… more »
1 Answer
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Aug 26 2022
Hi peers, In my opinion, it's very important for your enterprise firewall/NGFW to support ID-based rules.  What products do provide this feature? What kind of identity-based rules are supported by them? Thanks.
Read More »
Manuel Briones - PeerSpot reviewer
Manuel BrionesWe use Check Point for this solution through the Identity Awareness blade where… more »
5 Answers
Juma Alshehhi - PeerSpot reviewer
Juma Alshehhi
System Administrator at MOI

I am researching identity management solutions. Who in the team should be managing the IDM product?

Hasan Zuberi ( HZ ) - PeerSpot reviewer
Hasan Zuberi ( HZ )Depends on the Level of organizations. There are teams sometimes specifically… more »
Joakim Thorén - PeerSpot reviewer
Joakim ThorénTypically we see IDM products being managed by a system owner in the security… more »
Jay Bretzmann - PeerSpot reviewer
Jay BretzmannIt also depends upon what capabilities are required in your environment. Is the… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Insider data breaches can be a real problem in businesses. One way to address this issue is by implementing an identity and access management solution. 

What tips do you have for ensuring that one's identity and access management solution is effective?

Chris Bunn - PeerSpot reviewer
Chris BunnThe simplest and most common activity for every insider threat action is the… more »
Enrique Leon, CISA - PeerSpot reviewer
Enrique Leon, CISAWith experience in both IT and Audit, I can say the answer most often leads to a… more »
JoeValero - PeerSpot reviewer
JoeValeroThe premise of any effective Identity and Access Management solution is that… more »
6 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh Anand - PeerSpot reviewer
Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
Ahmad Zuhdi - PeerSpot reviewer
Ahmad ZuhdiAbsolutely! IAM is so important to prevent a data breach. With IAM we can make… more »
SteveAndrews - PeerSpot reviewer
SteveAndrewsSince cybercrime is on the aggressive rise, and our organizations working… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?

AdrianMache - PeerSpot reviewer
AdrianMacheI would go for RSA SecurID Suite due to strong compliance and continuous fast… more »
Michel Timp - PeerSpot reviewer
Michel TimpI would recommend Okta or HelloID (which includes Account provisioning , Acces… more »
Chris Faist - PeerSpot reviewer
Chris FaistRony - Access management is only a small part of GDPR compliance. GDPR is… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Hi peers,

Can you share your recommendations for the most efficient way to handle the employee identity lifecycle in a secure way? 

Also, any suggestions for the tools to put in place to ease this process?

Thanks!

Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Why Identity governance and administration are considered so important in enterprise IT management?

How can Identity Management (IM) tools help manage IGA better?

Efrén Yanez - PeerSpot reviewer
Efrén YanezWhy is identity governance and administration (IGA) important? By definition… more »
Enno Hoffmann - PeerSpot reviewer
Enno HoffmannWhy Identity governance and administration are considered so important in… more »
2 Answers
Mauricio Marinho - PeerSpot reviewer
Mauricio Marinho
IT Analyst at a financial services firm with 1,001-5,000 employees
I have more than seven years of experience working at a bank.  We bought SAP GRC that came with SAP IDM. Should we leverage SAP IDM and customize it for legacy or should we acquire a specialized legacy IDM solution? Which is the best option and which solution would you recommend? Thanks! I appr...
Read More »
it_user1123740 - PeerSpot reviewer
it_user1123740If you are looking for an SAP Certified IAM solution then I suggest One… more »
reviewer1191543 - PeerSpot reviewer
reviewer1191543You could consider Ubisecure for external IDM needs and Omada for internal… more »
SylvainMaertchik - PeerSpot reviewer
SylvainMaertchikI’m definitely not an expert in SAPG GRC but I can do some research if I have… more »
6 Answers
it_user867039 - PeerSpot reviewer
User with 5,001-10,000 employees

Can someone share the battle card between OpenIAM and Ping Identity in a more granular way? Please, no vendor sponsors, I need honest feedback. 

it_user834495 - PeerSpot reviewer
it_user834495There is a huge difference in between SSO and IAM. Don't confuse the 2 or you… more »
it_user455748 - PeerSpot reviewer
it_user455748Agreed. What are the business requirements?
it_user113982 - PeerSpot reviewer
it_user113982Agree With Arnold Felderbaum's comment. Asking for the "battlecard" (not… more »
6 Answers
it_user799734 - PeerSpot reviewer
Developer at a tech company with 51-200 employees

What are the Major differences between Sailpoint IdentityIQ  and Oracle identity Governance? I want to know the differences between these identity management systems.

it_user440760 - PeerSpot reviewer
Manager, Operations at a tech services company with 1,001-5,000 employees

Hello,

We are planning to migrate from CA IDM R12.6 SP3 to R14. Does anyone know a reliable way to migrate task persistence database? Customer wants the historic events as it is in the system, so we have to migrate. Any leads would be really appreciated. 

Ariel Lindenfeld - PeerSpot reviewer
Ariel Lindenfeld
Sr. Director of Community
PeerSpot
Avigail Sugarman - PeerSpot reviewer
Avigail Sugarman
Community Manager at PeerSpot (formerly IT Central Station)
Avigail Sugarman - PeerSpot reviewer
Avigail Sugarman
Community Manager at PeerSpot (formerly IT Central Station)
How does it compare to similar solutions? What are some of the main factors to consider when choosing a solution?
Read More »