

Omada Identity and Ping Identity Platform compete in the identity and access management category. Omada holds an edge in governance and Microsoft integration, while Ping stands out in security and integration ease.
Features: Omada Identity provides strict governance, flexible customization, and broad compliance reporting. Its automated provisioning simplifies identity lifecycle management. Ping Identity Platform offers secure identity management, supporting multi-factor authentication and adaptable deployment options, including efficient mobile integration.
Room for Improvement: Omada Identity requires UI improvements, better scalability, and simpler error handling with enhanced API accessibility. Ping Identity Platform needs a simplified UI, better customization for consumer identity management, and improved desktop application integration.
Ease of Deployment and Customer Service: Omada Identity offers flexible deployment with on-premises and cloud solutions but faces issues with technical support response times. Ping Identity Platform excels with hybrid cloud options and reliable customer service but encounters complexity in deployment processes.
Pricing and ROI: Omada Identity is competitively priced for on-premises setups, benefiting from automation efficiencies, though its cloud pricing is high. Ping Identity Platform offers flexible and cost-effective pricing, with positive ROI in security enhancements and scalability.
I have seen a return on investment with Omada Identity in terms of time saved and fewer employees needed.
If we look at one customer where we initially started, they had about four to ten employees working on IGA, and it is now almost half of it.
Omada Identity has definitely helped us save time when provisioning access for various identities.
The vendor support needs improvement because we have reported serious incidents that remain unresolved.
Maintenance is necessary, and aside from that, if there are issues with Salesforce cloud, then Omada Identity may go down.
The customer support for Omada Identity is excellent.
I have reached out to technical support for troubleshooting SAML certificate mismatches and federated errors between Ping and enterprise apps.
I would rate the technical support for Ping Identity Platform seven out of ten because of their limited support and late availability.
The scalability of Omada Identity is excellent; they offer flexible pricing for licenses, accommodating both full accounts and lighter identities, which makes it truly scalable.
Omada Identity is a top-growing tool that is booming in the market.
Omada Identity scales very well for our organization.
In terms of stability, I rate Omada Identity a nine out of ten.
We have experienced too many unexpected errors on a daily basis.
Omada Identity is a stable and reliable tool.
In terms of stability for Ping Identity Platform, we haven't faced any issues till now.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes.
The deployment of Omada Identity is complex; the product is not brilliantly documented.
I would like to enable ServiceNow Generative AI for auto-diagnosing PingFederate SSO failures and suggest remediation steps.
Ping Identity Platform has multiple products for access management, identity management, a solution for API security, a solution for authorization, and a product for identity verification.
There is a very limited number of legacy support, which can pose potential difficulties in integrating with certain older or legacy systems.
They are lower than some of their competitors.
the product itself is said to have a good price, although the support can be expensive.
Regarding pricing for Ping Identity Platform, I would rate it eight out of ten.
Omada Identity helps automate reviews of access requests and reroutes them to appropriate people, which is what it should do; it really assists in reducing the workload time.
You can really do it codeless by creating a custom process with the process designer, adding the building blocks of the process designer into the process, and then getting it to work.
The integration with those systems helps my workflow and saves time considerably because I can manage all the accesses and assignments through Omada Identity at once, eliminating the need to add a license through Azure or a mailbox through Exchange.
The platform enhances security measures by analyzing multi-factor authentication attempts, highlighting suspicious patterns, and generating compliance reports.
It's a converged platform which can do both identity management, access management, and recently they are bringing privilege management capability as well.
It is a completely comprehensive hybrid capable Identity and Access Management feature which provides features such as multi-factor authentication, Single Sign-On, then Identity Orchestration, centralized authorizations such as ABAC.
| Product | Mindshare (%) |
|---|---|
| Ping Identity Platform | 3.8% |
| Omada Identity | 2.7% |
| Other | 93.5% |


| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 45 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 2 |
| Large Enterprise | 21 |
Omada Identity offers robust governance, user lifecycle management, and seamless provisioning with Active Directory integration, simplifying access management with a user-friendly, self-service interface.
Omada Identity combines strict governance with easy configuration, offering automation that excels in user lifecycle management. Its integration capabilities with systems like Active Directory provide seamless provisioning. The platform features a user-friendly self-service interface, enabling efficient process design without coding, which simplifies access management. Role-based access control, reporting, and compliance features elevate security and operational efficiency. Omada Identity is adaptable to evolving requirements, ensuring scalability while maintaining ease of use and rapid response in support services.
What are the key features of Omada Identity?Industries implement Omada Identity to streamline identity lifecycles, provisioning, and certification processes. It supports cloud and on-premises environments, enhancing security, governance, and compliance. Automated access reviews and security policy enforcement are critical for managing diverse user groups. Organizations in sectors such as finance, healthcare, and retail leverage these capabilities to ensure smooth operations and safeguard sensitive data.
Ping Identity Platform offers cloud capabilities for applications, supporting Single Sign-On, Multi-Factor Authentication, and passwordless authentication. It features flexible integrations and federated identity management, enhancing security through detailed compliance features and seamless IDP integration.
This platform meets enterprise needs with role-based access control, device management, API security, and risk-based adaptations. Its BYOD support, ease of integration, biometric authentication methods, and customizable options with PingFederate aid in enhancing security and convenience. Challenges such as the complex management console, network reliability, and limited customization are present. Users find areas for improvement in incident response features, bio-certification, and network handling for IP classification. Community support and documentation need strengthening to address existing device tracking and token management issues.
What are the key features of Ping Identity Platform?In industries such as finance, healthcare, and IT, enterprises deploy Ping Identity Platform for its ability to implement seamless SSO and MFA. It integrates with protocols like SAML, OAuth, and OpenID Connect to secure communications and user identities. This enhances security and user convenience for customer-facing and internal applications.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.