Find out in this report how the two Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The actual support when you get to that level is a ten out of ten.
I would rate Microsoft technical support as a seven out of ten.
There is a need for better transformation support from on-premises Active Directory policies to the cloud, as Entra ID doesn't cover this sufficiently yet.
The frequent changes in branding cause confusion among customers who struggle to keep track of product names and functions.
Most features of Entra ID are part of Microsoft's ecosystem and included in Microsoft 365 bundles, which means there are no additional costs associated with pricing and licensing.
The stability of the solution is very high at 99.999%.
The stability of the solution is good with a rating of eight out of ten.
We can secure the applications that we are building and make sure that if the application were to be compromised, there is no full access to a customer's environment causing issues and other security concerns.
The main valuable feature is the integration into a single console, which includes authentication service and endpoint security.
Microsoft Entra ID is used for extending on-premises Active Directory to the cloud, managing application access, enabling multi-factor authentication, and single sign-on. It facilitates policy enforcement and secure access, ensuring centralized identity management across cloud and on-premises resources.
Organizations utilize Microsoft Entra ID for robust user and group management, identity synchronization, and conditional access. Its seamless integration with third-party apps, scalability, and support for remote work make it a preferred choice. The admin center streamlines identity and access tasks, enhancing efficiency and security with features like privileged identity management and audit logs.
What are the key features of Microsoft Entra ID?Microsoft Entra ID implementation varies across industries. Tech firms leverage it for secure, scalable access management, while healthcare organizations utilize its identity protection features to safeguard patient data. Educational institutions adopt Entra ID for streamlined user management and policy enforcement, ensuring secure access for students and staff across on-premises and cloud resources.
VMware Workspace ONE is an intelligence-driven digital workspace platform that delivers any app on any device. It integrates access control, multi-platform endpoint management, and application management. With the VMware Workspace ONE platform, IT teams can deliver a digital workspace that includes the devices and apps of the company’s choice, but with security and control.
VMware Workspace ONE is available:
VMware Workspace ONE Key Features
VMware Workspace ONE Benefits
Some of the benefits of using VMware Workspace ONE include:
Workspace ONE Components
Reviews from Real Users
Below is some feedback from our PeerSpot users who are currently using the solution:
PeerSpot user Patrick B., Cybersecurity Architect at a tech services company, says, "Its UI is extremely easy to use whether you're an advanced user or a novice user. When I first opened it up and had to learn the product, I was easily a novice. By the end of the third month, I was digging into the backend of the system and using it as a highly advanced user to accomplish what I needed to accomplish, and I was able to do it through the UI mostly."
Roshan T., Partner Manager North America at a tech company, mentions how satisfied he is with the product, saying, "You can put all your applications on a mobile device, be it a phone or tablet. It is secure and easy to use. Because it is centrally managed, you don't have to do any configuration on the phone. I just got the phone and connected to the central applications. I just downloaded one thing and everything got rolled out. Email, calendar, and other things were deployed centrally. If you don't have AirWatch, you have to configure your phone manually. For example, you need to deploy and configure your email manually and then synchronize everything. It is much simpler when a mobile device is centrally managed."
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.