

OpenText Identity Governance and OpenText Core Secure Access are key players in the identity management and secure access control market. OpenText Core Secure Access appears to have an advantage due mainly to its comprehensive features and perceived value, despite higher pricing.
Features: OpenText Identity Governance offers robust policy enforcement, efficient lifecycle management, and detailed compliance reporting for efficient identity administration. OpenText Core Secure Access features secure access protocols, adaptive authentication, and extensive integration capabilities, ensuring secure and efficient resource access.
Ease of Deployment and Customer Service: OpenText Core Secure Access provides flexible deployment models, including cloud-based and hybrid options, paired with efficient, responsive customer service for quick implementation and ongoing support. OpenText Identity Governance is recognized for robust support but focuses more on comprehensive on-premise deployments, which may involve a more extensive initial setup.
Pricing and ROI: OpenText Identity Governance offers a reasonable setup cost complemented by a solid ROI derived from its extensive identity management features. Conversely, OpenText Core Secure Access, while possibly more expensive, is acknowledged for a superior ROI through enhanced access control and integration efficiencies, suggesting long-term value through improved operational efficiencies and secure management.
| Product | Market Share (%) |
|---|---|
| OpenText Identity Governance | 1.2% |
| OpenText Core Secure Access | 1.1% |
| Other | 97.7% |
| Company Size | Count |
|---|---|
| Small Business | 9 |
OpenText Core Secure Access provides a comprehensive way to manage user authentication and authorization. It enables businesses to maintain security while accessing cloud applications efficiently.
Designed for businesses requiring secure and seamless access to cloud services, OpenText Core Secure Access facilitates the control of user permissions and enhances security measures. It integrates with existing systems, ensuring compliance and reducing risks. With its adaptable functionality, it supports a range of industries, ensuring sensitive data protection while improving productivity.
What features stand out in OpenText Core Secure Access?OpenText Core Secure Access is widely implemented in sectors such as finance, healthcare, and retail, addressing specific challenges like regulatory compliance, customer data security, and efficient resource access. By providing specialized features, it fits seamlessly into industry workflows, ensuring high levels of security without disrupting operations.
OpenText Identity Governance provides robust access review capabilities, risk analysis, and intuitive dashboards. Its advanced role mining and dynamic grouping ensure efficient access management, supporting compliance through separations of duties.
OpenText Identity Governance enhances access management and auditing processes through features such as role mining, access certification, and separations of duties that support efficient management protocols. Though it excels in stability, scalability, and integration with Identity Management solutions, it requires improvements in installation, Workflow Designer, and cloud application connectors. Addressing stability issues and offering enhanced Identity Intelligence features are essential for competitive edge. The governance tool leverages automated reporting and approval workflows, aiding large environments in streamlining management tasks. Its ability to integrate closely with NetIQ Identity Manager facilitates internal audits, particularly in banking and governmental sectors.
What are the key features?OpenText Identity Governance sees deployment in industries like banking and government, where auditing and access management are critical. It aids in permission management and account discovery, utilized notably in regions such as Chile and Argentina. Organizations benefit from its integration with NetIQ Identity Manager to ensure proper account activation and deactivation, ultimately facilitating sector-specific compliance and auditing tasks.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.