IAM Specialist at a tech services company with 11-50 employees
Reseller
Top 5
2024-02-14T14:19:05Z
Feb 14, 2024
You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review the users and access. The manager can approve or reject, and then it goes to the application owner for further review. This feature is especially important in large customer environments, as manual review can be challenging.
I really like the separation of the duties. It is the most ambitious model in the server because you have to create all the different rules, especially business rules. You have to check with the client and set different policies and rules, and then, you to have refine them. You will notice what is bad in the company and where the real problem is.
Managing Director at a tech services company with 51-200 employees
Real User
2021-11-17T00:56:42Z
Nov 17, 2021
All three functionalities, access certification, the configuration of duties, and role mining - especially role mining - are very advanced compared with the competition.
When doing a review you can either make manual or automatic fulfillment to immediately apply the manager's decision to the system, like removing or adding new permissions to the user account.
What is identity management (IM)? Identity management (IM), also referred to as identity and access management (IAM), is an organizational process used to securely connect electronic or digital identities with the right levels of access.
You can run reports and verify the access each user has. There is a process that runs automatically for access review. It sends an email to the manager and provides a task for the manager to review the users and access. The manager can approve or reject, and then it goes to the application owner for further review. This feature is especially important in large customer environments, as manual review can be challenging.
NetIQ Identity Governance has improved the security of my company.
This solution has been around for a long time. It has had lots of successful deployments and releases.
I really like the separation of the duties. It is the most ambitious model in the server because you have to create all the different rules, especially business rules. You have to check with the client and set different policies and rules, and then, you to have refine them. You will notice what is bad in the company and where the real problem is.
I like the queries and find the catalog to be comparatively powerful.
All three functionalities, access certification, the configuration of duties, and role mining - especially role mining - are very advanced compared with the competition.
When doing a review you can either make manual or automatic fulfillment to immediately apply the manager's decision to the system, like removing or adding new permissions to the user account.
We’re very satisfied with technical support. Usually we get people with the right knowledge who understand the solution very well.