Coming October 25: PeerSpot Awards will be announced! Learn more
2018-05-03T12:31:00Z
it_user867039 - PeerSpot reviewer
User at Tata Communications (america)
  • 5
  • 33

OpenIAM vs Ping identity

Can someone share the battle card between OpenIAM and Ping Identity in a more granular way? Please, no vendor sponsors, I need honest feedback. 

6
PeerSpot user
6 Answers
PeerSpot user
Security Expert at a tech services company
Real User
2018-05-16T13:39:47Z
16 May 18

Agree With Arnold Felderbaum's comment. Asking for the "battlecard" (not familiar with that term, but suspect you are asking about bakeoff results) is not going to help you, unless the respondant's business requirements are an exact match with your organization.

it_user455748 - PeerSpot reviewer
User at a healthcare company with 10,001+ employees
Real User
2018-05-15T17:26:26Z
15 May 18

Agreed. What are the business requirements?

PeerSpot user
Enterprise Architect at a consumer goods company with 1,001-5,000 employees
Real User
2018-05-15T15:18:56Z
15 May 18

There is a huge difference in between SSO and IAM. Don't confuse the 2 or you will be very disappointed. PING is SSO and partners with IAM providers while OpenIAM is a Identity Management System that provides SSO capabilities within its software. Single Signon is still managed by individual applications and AD. Our comparison was Okta and PING, but same concept.

PeerSpot user
EMEA Corporate Business Development Director at a consultancy
Consultant
2018-05-16T07:42:54Z
16 May 18

Suggest you get in contact with a cyber security consultant on this one....I would suggest the following Neira Jones or Colin Miles or Brian Brackenborough or Brian McGlone

PeerSpot user
IT Security Consultant and Platform Architect at E.I. du Pont de Nemours and Company
Real User
2018-05-15T18:41:34Z
15 May 18

Check out OneIdentity as another option in your analysis. https://www.oneidentity.com/ I'm not a vendor, and the company I work with does not use the IAM part, but I like it. Quest TPAM for privileged access management has been integrated to the OneIdentity suite, and is a very good tool.

PeerSpot user
IT Security Consultant and Platform Architect at E.I. du Pont de Nemours and Company
Real User
2018-05-15T18:32:14Z
15 May 18

I’m not familiar with those two products, unfortunately. Quest TPAM became One Identity, and is still the best, as far as I know.

Find out what your peers are saying about SailPoint, One Identity, ForgeRock and others in Identity Management (IM). Updated: September 2022.
634,775 professionals have used our research since 2012.
Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Apr 22, 2021
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
See 2 answers
RS
CEO at a tech services company with 11-50 employees
19 January 20
We pay a licensing fee to Ping on a yearly basis. We don't have to pay an extra fee for technical support.
Ppp_Ppp - PeerSpot reviewer
Regional IT Application Owner at a manufacturing company with 201-500 employees
22 April 21
We don't directly deal with the licenses. It's basically purchased by the central team and we are just consuming it through the common APIs. I really couldn't comment on the pricing at the moment.
CW
Founder & CEO with 51-200 employees
Feb 11, 2020
I'm building a next-gen AI powered threat intelligence platform and am wondering what features are missing from existing products on the market and how much customers are paying for their security tools. I'm also conducting research on pricing models. What is the preferred method of payment, i.e. based on number of endpoints, storage used, user-based, flat fee subscription based? Thank you ...
2 out of 9 answers
DJ
CEO & Founder at a tech services company with 1-10 employees
26 August 19
Raffael Marty, Vice President, Forcepoint Research and Intelligence, said: "There is no artificial intelligence in the field of information security, and it is unlikely to be developed in 2019." Most of unsupervised machine learning-based network anomaly detection solution does not provide why the anomaly has been aroused and whether the anomaly is malicious or not. Most of such solution's pricing model is based on number of endpoints but I prefer to have flat fee subscription-based.
ImadTaha - PeerSpot reviewer
Group CIO with 10,001+ employees
26 August 19
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by a second-generation AV but I need to have a solid 2nd gen. AV besides the total high cost of Darktrace which by the way is worth it for IT pros but not for business owners. We need to have something like virus total but for risks and threats beyond viruses where all vendors work on this and all endpoint customers with different vendors connect to it to be secured.
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 16, 2021
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privileged identity management, privileged access management, and identity and access management. Oftentimes, they also believe that privileged access management (PAM) and privileged account management (also PAM) are interchangeable terms – which is not entirely true. To shed some light on this topic, in...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 11, 2021
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user. Lik...
Abhirup Sarkar - PeerSpot reviewer
Director, Middle East, East India & SAARC at EverestIMS Technologies
Dec 08, 2021
Zero Trust is a set of techniques to secure end-to-end IT network infrastructure. Given the complexity of today’s networks, Zero Trust security principles continue to evolve and adapt to current demands. As indicated by the history of Zero Trust, an evolving IT security landscape was what had eventually led to this concept. And right from the start, the end goal was to ensure a strong and resi...
Rony_Sklar - PeerSpot reviewer
Community Manager at PeerSpot (formerly IT Central Station)
Oct 27, 2020
Members of the IT Central Station community are always happy to take a few minutes to help other users by answering questions posted on our site. In this Q&A round-up, we’re focusing on our users’ answers about SIEM, Identity and Access Management, and the Differences between Hyper-converged Infrastructure vs Converged Infrastructure. Which is the best SIEM tool for a mid-sized enter...
See 1 comment
Rony_Sklar - PeerSpot reviewer
Community Manager at PeerSpot (formerly IT Central Station)
27 October 20
@Himanshu Shah ​@Consulta85d2 ​@Aji Joseph ​@Mark Adams ​@Steffen Hornung ​@Dan Reynolds ​
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 16, 2021
Defining PIM, PAM and IAM
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privi...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 11, 2021
What is Privileged Account Management (PAM) and How Does It Work?
                                What is Privileged Account Management (PAM)? Privileged accoun...
Related Categories
Download Free Report
Download our free Identity Management (IM) Report and find out what your peers are saying about OpenIAM, ForgeRock, Oracle, and more! Updated: September 2022.
DOWNLOAD NOW
634,775 professionals have used our research since 2012.