I find that the propagation of identities is what is most valuable about the solution.
Enterprise Architect at a insurance company with 1,001-5,000 employees
It helps us with propagation of identities, although it'd be great if they could enable social media identities.
What is most valuable?
What needs improvement?
It would be great if they could enable social media identities. That’s the one thing we would like to have.
For how long have I used the solution?
I've used it for five years.
What was my experience with deployment of the solution?
The installation was OK. We had some problems with operating it, and because we use other products in the suite it made upgrading more complex. We do have a lot of other of their products also.
Buyer's Guide
Symantec Identity Governance and Administration
November 2024
Learn what your peers think about Symantec Identity Governance and Administration. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
831,265 professionals have used our research since 2012.
What do I think about the stability of the solution?
We’re only using it for employees, so the stability is handled very well.
What do I think about the scalability of the solution?
We're not putting too many users into the system, so it handles this very well.
How are customer service and support?
Customer Service:
They have been very proactive.
Technical Support:They have been very proactive.
What about the implementation team?
It was done in-house.
What's my experience with pricing, setup cost, and licensing?
We have a functional need. Therefore it was considered as more of an expense rather than an investment.
Which other solutions did I evaluate?
We looked at Oracle Identity and Access Management Suite that was the major contender at the time.
What other advice do I have?
I would be clear on what is the price for your customer and their identities. If you are going to manage partners, customers and other entities the numbers can get quite large, so it’s important to understand what you are getting.
We did a number of things in our deployment which made life more difficult on us. All in all it’s a positive relationship. The only concern we have is with the social logins and clouds.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Consulting Manager at a tech services company with 10,001+ employees
It's allowed us to implement compliance improvements. There's room for improvement on how components interact with each other and external components.
Valuable Features
- Identity
- Lifecycle
- Provisioning
Improvements to My Organization
Compliance improvements.
Room for Improvement
- Cloud integration
- More flexibility and interoperability - how components interact with each other and external components
Use of Solution
I have experienced implementing previous versions of the product six years ago.
Deployment Issues
No issues encountered.
Stability Issues
No issues encountered.
Scalability Issues
No issues encountered.
Customer Service and Technical Support
Customer Service:
9/10
Technical Support:9/10
Initial Setup
Quite straightforward.
Implementation Team
I’m part of a consulting team that does the implementation.
Other Solutions Considered
I’m aware on qualities of Novell (Netiq) Identity Manager and IBM Security (Tivoli) identity manager. It depends completely on business needs – for some cases one product will fit, for another cases another.
Other Advice
At first, a company should have an IAM strategy and clear vision. Then thorough a vendor comparison matrix to determine what product(s) matches what you need. Only then it will you have an understanding of whether to implement CA or not.
Disclosure: My company has a business relationship with this vendor other than being a customer: We're business partners.
Buyer's Guide
Symantec Identity Governance and Administration
November 2024
Learn what your peers think about Symantec Identity Governance and Administration. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
831,265 professionals have used our research since 2012.
Chief Consultant at a tech services company with 1,001-5,000 employees
It provides for self-service and role-based provisioning, although the UI could use some improvements.
What is most valuable?
- Self-service
- Role-based provisioning
- Access
How has it helped my organization?
It's saved on administration time, and reduced the wait time for access. It's also improved our compliance.
What needs improvement?
- Installation and upgrading is complex
- User Interface
For how long have I used the solution?
I've used it for six years.
What was my experience with deployment of the solution?
We did have some issues, but we were able to resolve them.
What do I think about the stability of the solution?
Yes, as Jboss cannot handle too much load.
What do I think about the scalability of the solution?
Yes, when feeding many users.
How are customer service and technical support?
Customer Service:
It's good.
Technical Support:It's very good.
Which solution did I use previously and why did I switch?
No previous solution was used.
How was the initial setup?
It was complex because many servers are needed to follow best practice. Many manual steps are time consuming. If you add the Governance component for full IAG, it will be even more complex, because it is not properly integrated with IdM but more a separate product.
What about the implementation team?
We used a vendor team who had a high level of experience.
Which other solutions did I evaluate?
We also looked at options from IBM and Oracle.
What other advice do I have?
You should use a vendor team for the design and initial implementation.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Manager at a tech services company with 10,001+ employees
It has delegated responsibility across to the customers, but bulk load capability needs improving.
What is most valuable?
The ability to customise the screen, and create a technical solution suited to the business requirements including delegation, password management and role based access.
How has it helped my organization?
Delegated responsibility across to the customers, instead of the organisation maintaining the user. In addition, this also allows user privacy and security to be maintained.
What needs improvement?
Multiple areas:
- Bulk Load capability
- Services
- Organisation propagation, etc.
For how long have I used the solution?
I've used it for the last seven years.
What was my experience with deployment of the solution?
Deployment was stable. Only issue was with the policy express and emails which were very dependent on the exact name instead of a tag.
What do I think about the stability of the solution?
If the product has been tuned, appropriated, and appropriate memory has been allocated, there are no issues with stability.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
8/10.
Technical Support:8/10.
Which solution did I use previously and why did I switch?
No. We moved from a manual user management system to a delegated user management system.
How was the initial setup?
Provided the requirements are set, the initial setup was straightforward. Subsequent functionality within CA IM is not appropriately documented creating issues.
What about the implementation team?
We used a vendor whose level of expertise was 8/10.
Which other solutions did I evaluate?
Yes, we also considered using Oracle Identity Manager.
What other advice do I have?
Use an agile approach of delivery if the business is not aware of what it wants.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Solutions Architect at a tech services company with 51-200 employees
The major plus points are simplicity, but do ensure you have the right resources before you implement this product.
What is most valuable?
The simplicity, easy installation and configuration.
How has it helped my organization?
I worked on this product as a consultant implementing it at various client locations so I cannot really answer this question from my own organization's point of view. But the tremendous value at client locations has been a centralized and simplified identity provisioning and management solution.
What needs improvement?
Been quite a while since I worked on it so I can't really comment on how far the product has come in the past 2-3 years.
For how long have I used the solution?
For almost 2 years at various engagements
What was my experience with deployment of the solution?
Nothing major encountered.
What do I think about the stability of the solution?
None encountered.
What do I think about the scalability of the solution?
No. The product gives flexibility with respect to application servers and databases so scalability more depends on the platform you choose.
How are customer service and technical support?
Customer Service:
Very good.
Technical Support:Very good.
Which solution did I use previously and why did I switch?
Clients I have worked at either didn't have an existing solution or had older versions of the same product.
How was the initial setup?
It is straightforward if you read the product documentation and understand the architecture before your set it up.
What other advice do I have?
The major plus points are simplicity, but do ensure you have the right resources before you implement this product.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are a vendor partner
Senior Information Security Analyst at a insurance company with 10,001+ employees
Enabled us to identify and certify over 6000 role-based profiles
What is most valuable?
Manage access certifications for whole company in one place.
How has it helped my organization?
We used this product to identify and certify basic access profiles in our company. Created more than 6000 role-based profiles for more than 26,000 colleagues. Profiles can be granted to a user when he starts to work in the company or changes departments and/or functions.
What needs improvement?
Yes, we found that if you create a certification with a high number of objects, the portal runs slowly. We are working with CA to manage this situation.
For how long have I used the solution?
Two years.
What do I think about the stability of the solution?
As noted above, we found that if you create a certification with a high number of objects, the portal runs slowly. We are working with CA to manage this situation.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Always available.
Which solution did I use previously and why did I switch?
No, this is the first product of its kind for us.
How was the initial setup?
It was not complex. CA and a partner worked with us on the setup.
What's my experience with pricing, setup cost, and licensing?
Our company has a long list of CA products, so the pricing is good for us, given the size of our company. The product was licensed by installation.
Which other solutions did I evaluate?
Yes, Oracle IAM.
What other advice do I have?
Choose a CA partner who is experienced in implementing this product and establish all Access Manager rules before you start operating the product. The product gives you a a nice overview but it's a good idea to define basic rules to create access profiles and certification.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Delivery Manager at a tech services company with 51-200 employees
Setup is straightforward and can be done quickly, but the UI has lots of room for improvement
What is most valuable?
Provisioning server and Policy Xpress.
How has it helped my organization?
It provides a robust provisioning facility which enables admin configuration. Complex provisioning rules are quick to change when business requirements do.
What needs improvement?
Workflow engine and workflow configuration. Also, the user interface has a lot of room for improvement.
For how long have I used the solution?
2 years.
What was my experience with deployment of the solution?
Yes, we encountered many product issues during deployment, and some were identified as product limitations.
What do I think about the stability of the solution?
So far no, the product works well and it's stable.
What do I think about the scalability of the solution?
Not at this moment.
How are customer service and technical support?
Customer Service:
The customer representatives of CA are good and they always give quick responses.
Technical Support:The support is helpful, the response time is fast, and their knowledge is good.
Which solution did I use previously and why did I switch?
Yes we used Oracle Identity and Oracle Waveset.
How was the initial setup?
Yes the setup is straightforward and it can be done quickly.
What about the implementation team?
I am working within a vendor team.
Which other solutions did I evaluate?
Yes, Oracle Identity Manager
What other advice do I have?
The ongoing support of the product is extremely important.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at a retailer with 51-200 employees
“A smart identity management solution that adds to your business advantage”
Valuable Features:
• Allows individual users to work in a controlled and secure environment, whereby user authentication, access control, password administration, and smooth workflow are ensured.
• Even if a user forgets theirs access information or password, Identity Manager helps users to restore access. This reduces the cost of help-desk support while making the daily operations much smoother.
• Large sized organizations require Identity Manager to ensure that their network and systems are secure for use or for access by delegated users.
• It ensures that business workflow is in compliance with secure standards of technology infrastructure.
Room for Improvement:
• Cost is the only demerit of Identity Manager because it requires updates of software and technology as users keep multiplying. Identity Manager is also prone to hackers and therefore needs to be regularly checked for security threats and intrusions.
• Users must be trained to use the system.
Other Advice:
Medium to large sized organizations require Identity Manager in order to allocate their technology costs in a much better way. After a one time heavy installation cost, companies do not need to worry about user password/access issues that may occur on a daily basis.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Symantec Identity Governance and Administration Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
SailPoint Identity Security Cloud
One Identity Manager
Microsoft Identity Manager
SAP Identity Management
Oracle Identity Governance
NetIQ Identity Manager
OpenIAM Identity Governance
SecureAuth Identity Platform
NetIQ Identity Governance
AlertEnterprise Guardian
Buyer's Guide
Download our free Symantec Identity Governance and Administration Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between SailPoint and CA IDM?
- SailPoint IdentityIQ vs. CA Identity Governance
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- Which is the best legacy IDM solution for SAP GRC?
- What are some tips for effective identity and access management to prevent insider data breaches?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
How is this app prone to hackers? Please elaborate the difference between this J2EE application and another. That's a pretty broad statement.