2021-11-03T05:17:00Z

What needs improvement with Entrust IdentityGuard?

Julia Miller - PeerSpot reviewer
  • 0
  • 6
PeerSpot user
6

6 Answers

Iwegbue Godspower Isioma - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-11-20T12:47:13Z
Nov 20, 2023

The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works for on-premises, but I'm not sure if it's fully supported in cloud environments. If support were added, it would function perfectly with on-premises configurations. So, it functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP.

Search for a product comparison
YP
Real User
Top 10
2023-10-11T06:12:53Z
Oct 11, 2023

The solution could provide a location-based authentication.

PO
Real User
Top 5Leaderboard
2023-09-04T07:32:57Z
Sep 4, 2023

The product is very costly compared to other alternative solutions.

Isaac  Hammond - PeerSpot reviewer
Real User
Top 10
2023-05-22T07:28:00Z
May 22, 2023

I would like to improve the tool's implementation and pricing.

Laura Ureta - PeerSpot reviewer
Real User
Top 20
2022-04-25T09:35:09Z
Apr 25, 2022

We are introducing new processes and are migrating to a new version. Once we explore new functionalities, we'll be able to assess what could be improved.

LR
MSP
2021-11-03T05:17:00Z
Nov 3, 2021

It would be better if the on-prem Entrust Identity Enterprise solution could have the same features as the cloud version because the latter is more easy to use. New features are always implemented on the cloud version first. In turn, I would also like to see the reporting that's available in the on-premise version on the cloud.

Find out what your peers are saying about Entrust Datacard, RSA, Cisco and others in Authentication Systems. Updated: March 2024.
765,386 professionals have used our research since 2012.
Authentication Systems
Authentication is the most fundamental component of access management and is part of security requirements in the digital world. It verifies the identity of users trying to access systems and data by validating their credentials.
Download Authentication Systems ReportRead more