Top 8 Access Management Tools
Azure Active DirectoryOkta Workforce IdentityAuth0ForgeRockSymantec SiteminderAkamai Enterprise Application AccessOneLogin Workforce IdentityOracle Access Manager
We haven't had any problems with stability. Everything works fine.
Technical support has been great.
A solution that's easy to use, stable, and reliable.
Its integration components are most valuable. It integrates with everything in some way. There are some products, such as O365 or AD, with which it completely and 100% integrates. So, you can seamlessly create accounts across the board with some of these products. For some of the products with which it doesn't completely integrate, you can do some kind of interfacing.
The solution's overall flexibility and customizability were the chief factors for selecting it in the beginning. They still remain among the best reasons to use Auth0. The flexibility that you get, and what it's allowed us to do on top of it in terms of code, is key.
The solution is very scalable. We have a lot of users that have been increasing over the years that we have been using it. We have approximately 20,000 users.
A valuable feature of Siteminder is the way it handles bulk traffic. The features it has, in terms of routing the traffic and load balancing, are good.
The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella.
Once I made the OneLogin ID, it would essentially make user names and passwords for every application that we had.
The solution's ability to save and manage of all my passwords is great.
From a technical perspective, the solution is very good we can operate and control the user by ourselves.
Once it is set up, it is easy to use and it integrates with most of the products on the market.
Advice From The CommunityRead answers to top Access Management questions. 564,599 professionals have gotten help from our community of experts.
Hi all, Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms? I've tried to check them out on the Web but unfortunately, was unable to understand the core concept. I appreciate the help!
Hi peers, What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?