Try our new research platform with insights from 80,000+ expert users
2017-06-13T10:34:00Z

Oracle Identity Manager vs. CyberArk Privileged Account Security

it_user326337 - PeerSpot reviewer
  • 90
Published:Jun 13, 2017
Explore related topics
Search for a product comparison in Identity Management (IM)
PeerSpot user
3

3 Comments

it_user327795 - PeerSpot reviewer
Real User
2017-06-13T12:58:53Z
Jun 13, 2017
it_user493179 - PeerSpot reviewer
Real User
2017-06-14T17:35:23Z
Jun 14, 2017
it_user528927 - PeerSpot reviewer
Consultant
2017-06-13T12:06:04Z
Jun 13, 2017
Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM). Updated: November 2024.
816,660 professionals have used our research since 2012.
Related Questions
Ariel Lindenfeld - PeerSpot reviewer
Mar 19, 2024
Mar 19, 2024
Identity Management (IM) is important for companies because it helps with: Ensuring security by managing access to sensitive information and systems Increasing productivity by simplifying the process of managing user accounts and access rights Streamlining compliance with regulations and standards by centralizing user authentication and authorization Enhancing user experience by providing s...
See 1 answer
NV
Mar 19, 2024
Identity Management (IM) is important for companies because it helps with: Ensuring security by managing access to sensitive information and systems  Increasing productivity by simplifying the process of managing user accounts and access rights  Streamlining compliance with regulations and standards by centralizing user authentication and authorization  Enhancing user experience by providing seamless access to applications and resources  Reducing IT support costs by automating user provisioning and de-provisioning processes
EB
Aug 10, 2022
Aug 10, 2022
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all employees. Any technical solution is not good enough to avoid willing leak of employee credentials by themself.
See 1 answer
LN
Aug 10, 2022
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all employees. Any technical solution is not good enough to avoid willing leak of employee credentials by themself.
Related Categories
Download Free Report
Download our free Identity Management (IM) Report and find out what your peers are saying about Microsoft, SailPoint, One Identity, and more! Updated: November 2024.
DOWNLOAD NOW
816,660 professionals have used our research since 2012.