Random token generation.
Director, identity & Access Managem at a financial services firm with 1,001-5,000 employees
Application and appliance stability needs improvement.
What is most valuable?
How has it helped my organization?
Soft and hard tokens for two factor authentication has been introduced.
What needs improvement?
Application and appliance stability needs improvement.
For how long have I used the solution?
I've used it for three years.
Buyer's Guide
Identity Management (IM)
October 2024
Find out what your peers are saying about RSA, SailPoint, One Identity and others in Identity Management (IM). Updated: October 2024.
814,763 professionals have used our research since 2012.
What do I think about the scalability of the solution?
There were some scalability issues.
How are customer service and support?
Customer Service:
6/10.
Technical Support:6/10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Identity Management (IM) Report and find out what your peers are saying about RSA, SailPoint, One Identity, and more!
Updated: October 2024
Product Categories
Identity Management (IM)Popular Comparisons
Cisco Identity Services Engine (ISE)
CyberArk Privileged Access Manager
SailPoint Identity Security Cloud
One Identity Manager
Buyer's Guide
Download our free Identity Management (IM) Report and find out what your peers are saying about RSA, SailPoint, One Identity, and more!
Quick Links
Learn More: Questions:
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- Which is the best legacy IDM solution for SAP GRC?
- What are some tips for effective identity and access management to prevent insider data breaches?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What access management tools would you recommend to help with GDPR compliance?
- Why is identity and access management (IAM) so important in preventing data breaches?