We using it internally. We are also offering it to our customers as a managed service.
Lead Solution Architect at Tieto Sweden AB
You can scale it quite big, which is good, and it has good sizing
Pros and Cons
- "It brings simplicity into complex matters."
- "You can scale it quite big, which is good. It has good sizing."
- "It is a large solution where you need to learn how to work in a certain way for it to provide the best benefit."
- "I would like some access management features to be added. We have some customers with a small need to do authentication as a service, and there are other solutions on the market which offer this."
What is our primary use case?
How has it helped my organization?
I have heard that the overall security is much better, although we still have slow processes going on within the company. Internally, this is what I have heard, since I work more on the customer side.
Since we are ISO 27001 compliant and GDPR compliant, the product has probably helped with this.
What is most valuable?
It brings simplicity into complex matters.
What needs improvement?
I would like some access management features to be added. We have some customers with a small need to do authentication as a service, and there are other solutions on the market which offer this.
It is a large solution where you need to learn how to work in a certain way for it to provide the best benefit. On the other hand, it's really a structured way so you should work in a structure way, as it is a compliant to other frameworks.
Buyer's Guide
One Identity Manager
January 2025
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
What do I think about the stability of the solution?
I haven't heard any complaints regarding stability.
There was some slowness when we implemented it, but I haven't heard anything since.
What do I think about the scalability of the solution?
You can scale it quite big, which is good. It has good sizing.
We have some smaller customers where the solution is too big, but that is an IAM world issue.
We have 15,000 people working for us.
How are customer service and support?
I've been happy with the technical support. When I previously worked in another company implementing One Identity Manager, I was pretty happy with support.
How was the initial setup?
The initial setup for us is quite simple, and we have done some measures internally to make it even easier.
What about the implementation team?
We have used other partners to help with our own implementation.
What was our ROI?
We're using it to monitor the customer environments, which has helped us increase employee productivity when it comes to provisioning users and systems.
It has helped to reduce help desk calls quite a lot, since not we are using the Access Manager which looks into our web services.
What other advice do I have?
I think it's one of the best solutions on the market.
It is a big task to implement alone, so ask a lot of questions if looking to implement.
You can see and do a quite a lot. It is really open in that way, but going out and trying to do stuff which it isn't meant to do, that's much harder. I wouldn't go there. However, it's gives you a good framework to work and build on.
The policy and role management features work. They are getting better all the time. I don't really have a better experience from other solutions.
I am just learning the privileged account governance features and how they work.
We don't have SAP internally. We offer it as a service, as a company, to our customers, but we don't use it.
We are managed service providers, so we cannot have our own private cloud.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Founder at a consultancy with 1-10 employees
Business-oriented and IAM administrator-oriented, easy to configure and scale up, and has a helpful and knowledgeable technical support team
Pros and Cons
- "In terms of what I found most valuable in One Identity Manager, it's the only product where the workflow and the catalog can be configured on roles or by business people. You don't need to know the technology at all to configure that, so this is the product's biggest advantage as well as its strongest feature. One Identity Manager is also business-oriented and IAM administrator-oriented."
- "A room for improvement in One Identity Manager is its analytics. Though it's getting better from version to version, the analytics feature still needs improvement. I would appreciate more analytical features in the next release of One Identity Manager, so I can do a better analysis. Another vendor, for example, has a self-certification system where you can send people, then create a type of profile or screen for each person, and the person can see his entitlement and the risks behind that entitlement, so then the person makes a decision on whether he wants to keep or let go of it, and that's an out-of-the-box feature that would be good to see in One Identity Manager. Another feature I'd like to see in One Identity Manager that would be very interesting is integration with SIEM or any log collection product for both access and usage. For example, I'd be able to see that I have access to a particular application and also get information on how many times I've accessed it in the last year, last few months, etc. It's a feature that would be great to have in One Identity Manager."
What is our primary use case?
We use One Identity Manager for every need. We use it for provisioning, cataloging, approvals, connecting to systems, and also for trying to figure out what's going on, governance, reporting, and provisioning changes. It's also for leavers, joiners, and movers. The solution is for everybody.
What is most valuable?
In terms of what I found most valuable in One Identity Manager, it's the only product where the workflow and the catalog can be configured on roles or by business people. You don't need to know the technology at all to configure that, so this is the product's biggest advantage as well as its strongest feature. One Identity Manager is also business-oriented and IAM administrator-oriented.
What needs improvement?
A room for improvement in One Identity Manager is its analytics. Though it's getting better from version to version, the analytics feature still needs improvement.
I would appreciate more analytical features in the next release of One Identity Manager, so I can do a better analysis. Another vendor, for example, has a self-certification system where you can send people, then create a type of profile or screen for each person, and the person can see his entitlement and the risks behind that entitlement, so then the person makes a decision on whether he wants to keep or let go of it, and that's an out-of-the-box feature that would be good to see in One Identity Manager.
Another feature I'd like to see in One Identity Manager that would be very interesting is integration with SIEM or any log collection product for both access and usage. For example, I'd be able to see that I have access to a particular application and also get information on how many times I've accessed it in the last year, last few months, etc. It's a feature that would be great to have in One Identity Manager.
For how long have I used the solution?
I've been using One Identity Manager since 2008.
What do I think about the stability of the solution?
One Identity Manager is a very stable product. Because the product is Microsoft-based, it all depends on how good your Microsoft database administrator is. One Identity Manager is a product that sits completely in the database, so if your database cluster is administered right, you'll be fine.
What do I think about the scalability of the solution?
Scaling up One Identity Manager is extremely easy.
How are customer service and support?
I've contacted the technical support team for One Identity Manager, and the team was very helpful and very knowledgeable.
Which solution did I use previously and why did I switch?
We previously used different solutions, particularly SailPoint and Saviynt. We compared those with One Identity Manager and we found out that among those three solutions, One Identity Manager has the best feature from a business management standpoint and from an identity standpoint, plus we're a Microsoft shop and One Identity Manager being a Microsoft based product also makes a big difference, especially as the solution has a natural integration with Active Directory and many other tools provided by Microsoft.
How was the initial setup?
In terms of how easy it is to set up One Identity Manager, it depends on who you're talking to. For me, the initial setup is extremely easy and very self-explanatory, but I'm someone who has twenty years of experience.
How long the deployment of One Identity Manager takes would depend on your scope. The average deployment is between three to six months.
What was our ROI?
I've seen ROI from One Identity Manager.
What's my experience with pricing, setup cost, and licensing?
The licensing for One Identity Manager is per user, per carbon life, specifically, it's per people, and not a per-identity licensing model. For example, if I have two hundred people, or if I have someone with several identities, I'm only paying for it once. I don't remember the exact cost of One Identity Manager because I wasn't the one who paid for the license.
Which other solutions did I evaluate?
We evaluated SailPoint and Saviynt apart from One Identity Manager.
What other advice do I have?
I don't remember the exact version of One Identity Manager I'm using, but it's the latest supported version.
Everybody uses One Identity Manager in my company because everybody's making requests, but the average number of users of the product is between thirty thousand to forty thousand.
My advice for anyone who's interested to use One Identity Manager is to find a good partner who can help you go through the product because no matter what product you buy, you need someone who can guide you. You should also have dedicated people who can learn and administer the product from the get go, not just when it's live or in production, but from the time of installation and implementation, because One Identity Manager is a great product and you need to watch how it's configured. Unlike in SailPoint and Saviynt where there's a lot of code involved, One Identity Manager is a product that has a configuration you can still understand when you're sitting next to somebody configuring it, so it's best to start learning the product from day one. You should also take notes and write documentation about what you've learned and what you did, even if you found it easy to configure, so many different people can do configurations in your place, and for you to also keep track of the versions and who did what, what this particular workflow does, and what this configuration does because if you're not doing the configuration all the time, you're going to get lost on it without documentation that you can reference and follow.
I'd never give a solution a rating of ten out of ten because the perfect solution doesn't exist. I'd be rating One Identity Manager a nine, and the reason for this rating is that if you think about implementing any identity governance tool, the biggest amount of money you spend is not on technology, and the biggest amount of time you spend is when you're talking to businesses to understand processes, then translate those into the actual implementation. That would take up the most time in terms of processes. One Identity Manager helps you make it shorter because people in business can, instead of describing what's going on, if you train people right and let them go into the product and configure it because there's no technology involved, you can save yourself plenty of time responsibility-wise and access-wise, and this is what makes One Identity Manager a nine out of ten for me.
My company is a customer and partner of One Identity Manager. I'm a consultant for companies that have the solution. I'm also a partner who installs and offers consulting around One Identity Manager along with other products. I'm also a partner of Saviynt, SailPoint, and Microfocus. I also have experience with Oracle and Fisher.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: customer/partner
Buyer's Guide
One Identity Manager
January 2025
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Systems Specialist at a financial services firm with 501-1,000 employees
Automates assignment of users to AD groups and brings all our systems together in one place
Pros and Cons
- "Nobody has to put people in AD groups by hand anymore. It goes automatically and that's very good. It's also very flexible. It's quite easy to customize and we have customized it a lot."
- "One of the things we would like is the ability to have more than one system role manager. That would be nice. For example, when people are on vacation, sometimes it gets a little hard to administrate system roles."
What is our primary use case?
We use it to control identity and access management in our company.
How has it helped my organization?
It has helped when people need access somewhere. It makes it much faster to grant user access. I used to be the one who gave everybody their rights and it took me a few days per week to do it. Now, it's just pressing a button. It's a huge time saver. I don't have to create the users in AD anymore.
All of the systems that we use are in Identity Manager, we didn't have that before. It was hard to even say what kind of systems we were using. Everybody had their own system. When somebody said, "I need to get access to that system," everybody often answered, "Oh, what system is that? Do we have a system like that?" Now, everything is in the same place and they can access so much more, and it's easier to get access.
The solution has also helped to very much simplify compliance. By law, once a year, we have to check what kind of access our users have. For compliance, they can look at everybody's rights because they can see them from Identity Manager. They can look at what kind of rights and access people have and get reports easily. It was very much harder before when we had to make Excel lists.
It has also helped to notably reduce helpdesk calls. Before we had Identity Manager, people called a lot. Now they don't call that much anymore about needing access to something. They can get access, themselves, from the IT shop.
What is most valuable?
Nobody has to put people in AD groups by hand anymore. It goes automatically and that's very good.
It's also very flexible. It's quite easy to customize and we have customized it a lot. There are many features already in it that you can choose from but you don't have to use everything. You can use just a few features and leave things out.
What needs improvement?
I don't have my list at the moment, but there are things we would like to have. One of the things we would like is the ability to have more than one system role manager. That would be nice.
For example, when people are on vacation, sometimes it gets a little hard to administrate system roles. Usually, one of us has to change our role to the system role manager. In addition, we have a few systems that have many owners. They could manage the rights and access to their systems with that function.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
It has been stable. We haven't had many technical problems at all. Maybe there have been some small issues, but not anything that has been affecting my work. The performance is okay. It works quickly and is stable.
How are customer service and technical support?
We speak to our consultants. They are our technical support.
Which solution did I use previously and why did I switch?
We had something we built ourselves, but it was not integrated with anything. It was mostly just a list.
When the world is changing and getting more technical, people need more access and we needed the ability to check what kind of access people have. There are all the GDPRs and other things that involve our company. We also thought it would be nice to have some automation for AD. I was literally creating people in AD and giving them rights to different places, putting them in AD groups. It was wasting time and, when a person does it, there are probably mistakes and you're not always sure what's happened. There's no tracking of who did what. Now we can track everything.
How was the initial setup?
That initial implementation was a long process. It took about two years from the time we decided to take the product until we had it in production. There was a lot of fixing and thinking and configuration.
Overall, there were about ten people involved in the implementation, but we have two developers who work actively in developing it at our company. And we have about two-and-a-half people who actually work with it.
Upgrades take a while. The last upgrade we did was from version 6 to 8, when we migrated. It wasn't that difficult. It took time but we prepared properly for it, so it went very smoothly. That migration took a weekend or three days, but the preparations were over the course of many months.
We had a lot of customization in version 6, and we had to clean that up so that version 8 would work smoothly and without problems. Then, we changed our consultants as well, so we had new consultants for version 8. They knew the code better and they told us we had a lot of faults in in version 6 that we needed to fix before version 8 because they wouldn't work in version 8 anymore. We cleaned up a lot of systems and users so that we wouldn't take a lot of garbage with us to the new version.
There were two people who did the migration and they had to learn a lot about how to do it. Then we did testing in version 8 to see how everything was working. In the future, the work involved in upgrading will probably be much less because there won't be that big of a gap. In this case we had to first migrate from 6 to 7 and then 7 to 8. It was a very long process, a big project. I don't think we will do that again. I think we will upgrade with smaller gaps in the future, to make it easier.
Which other solutions did I evaluate?
We looked at one other vendor, but it was some time ago. It might have been something from Microsoft. I don't think we looked at it that seriously because, as I remember, we decided on One Identity quite fast.
What other advice do I have?
It's very good to have a system that handles access rights and a system that you can automate with a lot of other systems like with LDAP and Active Directory. You can probably integrate it with other things as well. For us, it has been a very nice product and we are very happy with it.
The advantages come with many other things that need to be done to use Identity Manager. It takes time to create things and get new systems and features running and to teach people how to use it.
We've heard about the privileged account governance features. We haven't yet started using them but I think we will soon.
Overall, I would rate it at nine out of ten. There are always things to improve on, nothing is ever perfect. I like the product and I think it's nice to work with, but I don't do that too much technical stuff. For everything I do with it, I think it works fine.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Service Owner Identity & Access Management at a financial services firm with 10,001+ employees
Workflow feature is key for us, but the solution needs to improve on integration
Pros and Cons
- "Workflow management is an important feature. With other identity management products, there was no workflow management so we had to build it ourselves."
- "I would like to see a lot more integration with our platforms, more on the connector side."
What is our primary use case?
We use it to give the right access to the right resources.
How has it helped my organization?
It has made us much more effective and efficient in providing access to users and in managing certain processes. It has definitely helped to increase employee productivity when it comes to provisioning users and systems. It's difficult to estimate how much their productivity has increased because we already had some identity management systems. I don't know how much this solution has helped us compared to the other systems, but it has definitely helped.
What is most valuable?
Workflow management is an important feature. With other identity management products, there was no workflow management so we had to build it ourselves. That's one of the reasons we selected One Identity.
We have also found the solution to be flexible. We can customize a lot of things and arrange most things within the product.
It has also definitely helped simplify compliance.
What needs improvement?
I would like to see a lot more integration with our platforms, more on the connector side. We are still using version 7.1. There are a lot of new features in 8.1, so we will look forward to using that.
What do I think about the stability of the solution?
The product is good, it's stable.
What do I think about the scalability of the solution?
I'm relatively new in this role and I haven't figured out how scalable it is. That's one of the use cases I'm working on with my engineers right now.
How are customer service and technical support?
Technical support is good.
Which solution did I use previously and why did I switch?
We were using several solutions for access and we finally selected One Identity as the best solution for our purposes. We had a home-grown identity management solution, but because of the complexity of it we selected One Identity Manager as our future-looking identity management product.
How was the initial setup?
The setup was complex but it was mostly because of our environment. We have a very complex environment. We have a lot of ancient systems.
Which other solutions did I evaluate?
All the big ones were on our list. We chose One Identity because of the possibilities that were already present in the system. There were more than in the other ones.
What other advice do I have?
It's a good product which provides great opportunities.
Regarding the policy and role management features, I hear they're good. I don't know that part as well, but I have heard from the engineers they're pretty okay.
We have integrated One Identity Manager with SAP, but we're moving from SAP as an HR system to the Workday system. We're in the middle of that integration right now. The original integration with SAP was done before I started using the product, but I from what I heard it was pretty okay. But you have to have a lot of knowledge of One Identity Manager before you can start implementing it, and knowledge of it is a bit of a problem.
The solution hasn't yet impacted our cloud strategy because we are not working hard on cloud strategy right. We're thinking about moving some pieces but we have not yet implemented it.
We know that version 8 is much better than the version 7 we use. But the version we use is about a seven out of ten because we have had some real difficulties with the integration part, from the old systems.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security engineer at a consultancy with self employed
Customizable as per requirements and helpful for compliance
Pros and Cons
- "One Identity Manager is very customizable to meet customer requirements."
- "The implementation of the tool and management on the infra side is a bit difficult."
What is our primary use case?
The primary use case for One Identity Manager is for managing identities.
How has it helped my organization?
One Identity Manager helps with role-based access and compliance. These are the two main advantages of One Identity Manager. In addition to identity governance, One Identity Manager supports attestation, filtration, and auditing.
One Identity Manager is very customizable. We are able to customize it as per the customer's requirements. However, when you have a lot of customization, it requires a skilled resource with a coding background. I would rate it an eight out of ten from that aspect.
It has enabled application owners or line-of-business managers to make application governance decisions without IT. Each application or role is tagged with an owner, and this owner has the privilege to manage.
We use business roles to map company structures for dynamic application provisioning. This capability is very important for us.
We have integrated the solution with AWS. This integration is very important because the infra of the organization is managed on the cloud.
What is most valuable?
One Identity Manager is very customizable to meet customer requirements. We can write custom code as per customer requirements.
Role-based access is also very valuable.
What needs improvement?
The implementation of the tool and management on the infra side is a bit difficult. They can simplify implementation and management, making it easier for more customers. Other market tools have better implementation capabilities.
For how long have I used the solution?
I have been using One Identity Manager for three and a half years.
What do I think about the stability of the solution?
The stability of One Identity Manager is very good. I would rate it a ten out of ten for stability.
What do I think about the scalability of the solution?
I would rate it a seven out of ten for scalability.
Our clients are medium-sized businesses, but we have had organizations with 1,00,000 users.
How are customer service and support?
I would rate their support a seven out of ten. There are other vendors in the market that provide better support. We use regular support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used other vendors like SailPoint. One Identity Manager stands out in customization compared to SailPoint, but SailPoint is better in terms of implementation.
How was the initial setup?
The initial setup was mostly straightforward. Only in certain areas, it was complex.
The deployment duration depends on the organization and the customization they want. It usually takes three to four months for a standard deployment without any customizations.
It requires maintenance on a regular basis. Mostly, it requires monthly maintenance.
What other advice do I have?
I would recommend this solution depending on the environment and customization requirements of users. I would recommend it only if it meets the requirements of an organization.
I would rate One Identity Manager an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Oct 30, 2024
Flag as inappropriateCEO at IT Design Software Projects and Consulting
The solution solves our customers' compliance issues and optimizes their administration
Pros and Cons
- "The solution is flexible because you can realize the customer needs. Therefore, it is easy to upgrade specialized things. It provides the flexibly, so you can implement customers' use cases."
- "With technical support, it is always an issue to get the right person. They do have good technical people in support, but it is sometimes not so easy to get them."
What is our primary use case?
We use it for the identity lifecycle.
How has it helped my organization?
The solution solves our customers' compliance issues and optimizes their administration.
The solution helps to reduce help desk calls in the areas of password resets and misunderstanding requests.
What is most valuable?
It is highly integrated with our clients.
The policy and role management features are good.
The solution is flexible because you can realize the customer needs. Therefore, it is easy to upgrade specialized things. It provides the flexibly, so you can implement customers' use cases.
What needs improvement?
The connectivity to the cloud with the cloud identity need improvement. The whole security story in the area of access management along with the possibility to get access is part of this improvement process. This is the cloud access manager (CAM), and it isn't as it should be, but it's a very good long-term solution.
It is important to get the cloud integrated. One Identity is stalling about this in America, and we need it in Europe.
What do I think about the stability of the solution?
The stability is fine. It works for our use, and the customer is satisfied with it.
What do I think about the scalability of the solution?
The scalability is good. We use it in smaller customer suites, but also in larger ones.
How are customer service and technical support?
With technical support, it is always an issue to get the right person. They do have good technical people in support, but it is sometimes not so easy to get them.
How was the initial setup?
The solution is easy to set up, but it requires customization, which is not easy for identity management.
What was our ROI?
When many people are coming or leaving the company, the process is optimized. The productivity is higher because the process can be done faster and easier.
What other advice do I have?
The solution is used very often in the market. There are a lot of satisfied customers using the product.
They are a lot of partners who can help you implement it, if you are interested.
We know few other products in this industry. The flexibility, long term plan, and roadmap are very good. Also, its future is looking good.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
IT Engineer at Gorenje Vertriebs GmbH
Our employees get everything that they need the day that they start
Pros and Cons
- "The solution is flexible. You can customize it a lot. You can can build connectors, connecting them to a new application, and so on."
- "The initial setup was quite complex because you run into some existing policies that the company already had. There was some trouble with some inconsequential policies."
What is our primary use case?
We use it to manage identities, We have around 12,000 employees who need to be managed, which is a lot of people worldwide. It is sort of stressful to manage proactively unless you have automated systems.
How has it helped my organization?
We have an SAP connector since we have integrated the solution with our HR database.
What is most valuable?
Simulation mode of One Identity Manager for company policies, station policies, business roles, etc.
The solution is flexible. You can customize it a lot. You can also customize parts of it. You can can build connectors, connecting them to a new application, and so on.
What needs improvement?
There are some good things about the policy and role management features, but you can't really use them to their full potential. A lot of customizing that we have to go through to implement new processes and new customized policies could be better. Though, overall, it is great.
They need to implement a lot of best practices for this solution.
What do I think about the stability of the solution?
The stability is okay. It really depends on if there have been changes made on the database where you are trying to obtain your data.
How are customer service and technical support?
I haven't had much contact with the solution's tech support. My partner contacts them.
Which solution did I use previously and why did I switch?
Our company didn't have any of this type of solution before, so it's a totally new process that we're going through at this very moment.
How was the initial setup?
The initial setup was quite complex because you run into some existing policies that the company already had. There was some trouble with some inconsequential policies.
What about the implementation team?
We used our partners, who are an integrator. Everything is in one box.
What was our ROI?
The solution has helped us increase employee productivity when it comes to provisioning user interface systems. Our employees get everything that they need the day that they start.
What other advice do I have?
Build a strong team for this solution because there will be a lot of issues that you will have to go through, especially on your HR database. Build a team that knows how to listen and how to act.
The SAP integration process was quite interesting. You have to search for the answers in the right department with the right people. After that, it becomes easy.
We are currently not on the cloud.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Engineer at a manufacturing company with 11-50 employees
Easy to use, handle complex requirements, and has helpful support
Pros and Cons
- "It's very easy to roll out."
- "The interface can be a bit complex for an administrator to manage."
What is our primary use case?
We primarily use the solution for background management. It's used for provisioning and license management.
How has it helped my organization?
The solution has helped a lot with compliance. We can review access and have recertification alerts that make governing very easy.
What is most valuable?
It's very easy to roll out. They do have various defaults available, so you have a variety of rollout options.
It is very easy to handle complex requirements. It provides a very good user experience.
I like the user interface. I'd rate it three out of five.
The solution provides an attributes-based setup, a dynamic role setup, and many other features for enterprises. It provides a single platform for enterprise-level administration.
It has an easy user experience. It's great. From an intuitiveness standpoint, I'd rate it three or four out of five. It tries to make it easy for administrators to fulfill requirements, even if it needs to be customized.
The customization is top-notch. It's the best compared to any other tool we've used. It fulfills a lot of needs. I'd rate the level of customization three out of five.
While I haven't really used the solution's business roles to map company structure for dynamic application provisioning, leadership has used it for this purpose. My understanding is that it is quite good.
The product does help minimize gaps in governance coverage for test development and production servers.
It's helped us to achieve an identity-centric zero-trust model. We are able to set up dynamic rules centrally.
What needs improvement?
The interface can be a bit complex for an administrator to manage. I've used it for a long time; however, for a bit, I was confused. They need to work to make it easier to understand more quickly.
For how long have I used the solution?
I've been using the solution for a year and a half.
What do I think about the stability of the solution?
The solution has great stability. I'd rate it eight out of ten.
What do I think about the scalability of the solution?
We had 20 to 30 resources involved in the solution. The scalability is very good. I'd rate the scalability seven out of ten. There are some slight challenges, moreso related to human error; however, beyond that, scalability is great.
How are customer service and support?
Technical support has been responsive enough. We do use premium support. You get a great response time and it helps us manage things very smoothly. It also offers support for many different regions. They've helped a lot with integrations.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used different solutions in the past, including CyberArk. This solution, however, is great for identity governance.
How was the initial setup?
There was no problem with the deployment process. It took around a week to implement - maybe less than that with planning in place. It usually takes about two weeks to deploy.
What's my experience with pricing, setup cost, and licensing?
The product is fairly priced.
What other advice do I have?
I'd rate the solution eight out of ten.
I'm a customer of the vendor.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Fortinet FortiAuthenticator
ForgeRock
Microsoft Identity Manager
SAP Identity Management
Oracle Identity Governance
OneLogin by One Identity
NetIQ Identity Manager
EVOLVEUM midPoint
Symantec Identity Governance and Administration
RSA Identity Governance and Lifecycle
OpenIAM Identity Governance
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which one is best: Quest One Identity Manager or Forgerock Identity Management
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- Which is the best legacy IDM solution for SAP GRC?
- What are some tips for effective identity and access management to prevent insider data breaches?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What access management tools would you recommend to help with GDPR compliance?