Coming October 25: PeerSpot Awards will be announced! Learn more
2020-10-07T14:03:00Z
PL
Infrastructure Architect at Forefront consulting
  • 0
  • 30

Is there a good comparison (matrix) for Microsoft Identity Manager vs any identity and access management solutions?

Hi community members,

I'm researching identity management/identity and access management solutions. 

Are there any good comparison matrices comparing Microsoft Identity Manager to other identity and access management solutions?

Thanks in advance,

Peter

0
PeerSpot user
Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
May 26, 2022
Hi Everyone, What do you like most about Microsoft Identity Manager? Thanks for sharing your thoughts with the community!
2 out of 9 answers
Venkatesh Ampolu - PeerSpot reviewer
Principal Security Advisory Consultant and Delivery Lead at a tech services company with 1,001-5,000 employees
11 April 19
Microsoft integration products are strong. That is what I like about the product.
SA
CTO at a music company with 10,001+ employees
16 May 19
The most valuable feature is that it provides protection for our company documents.
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
May 26, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
See 2 answers
Venkatesh Ampolu - PeerSpot reviewer
Principal Security Advisory Consultant and Delivery Lead at a tech services company with 1,001-5,000 employees
11 April 19
Microsoft Identity Manager comes with the premium or community license. If the customer doesn't have a premium license, the reseller who sells the licenses of Microsoft to the enterprise can extend the license for the client. Generally, I don't have exposure towards the final figures, but I believe Microsoft is very well in line with other products in terms of pricing.
TC
Engineer at Kessler
26 May 22
MIM is free with a Microsoft Azure license.
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Jan 17, 2022
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, firewalls, IDS, IPS, SIEMs and email gateways are no longer considered fully effective. It needs to be c...
See 2 comments
DM
Director at DNAX s.r.o.
12 January 22
As a cybersecurity professional, I would NEVER outsource a PAM solution anywhere outside of my company, no matter how beneficiary it could look at a first sight. In the end, it can cost you everything.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
17 January 22
HI @DavidMateju​, Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 16, 2021
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privileged identity management, privileged access management, and identity and access management. Oftentimes, they also believe that privileged access management (PAM) and privileged account management (also PAM) are interchangeable terms – which is not entirely true. To shed some light on this topic, in...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 11, 2021
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user. Lik...
TA
Technology Principal Consultant (IDM/GRC/SECURITY SME) at SAP
Jan 29, 2021
The use of Central User Administration (CUA) if you are an SAP customer is outdated. This user management method is over 20 years old. Managing users with CUA is time-consuming and painful, setting users up in an Enterprise environment. The Benefit of an IDM implementation using SAP IDM NW 8 for On-Premise or Identity Provisioning Services (IPS) allows you the flexibility to manage systems acr...
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Jan 17, 2022
Privileged Access Management as a Service (PAMaaS): benefits and service offerings
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing tec...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 16, 2021
Defining PIM, PAM and IAM
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privi...
Download Free Report
Download our free Identity and Access Management as a Service (IDaaS) (IAMaaS) Report and find out what your peers are saying about Microsoft, SailPoint, One Identity, and more! Updated: September 2022.
DOWNLOAD NOW
635,513 professionals have used our research since 2012.