- Risk Analysis Engine
- Business-IT Role Mining, Certifications
- Dynamic Grouping
- Life Cycle Management
- Provisioning Integration Modules with IDM solutions
- Intuitive and customized Dashboards
- Advanced Analytics
Identity and Access Governance Pro
The installation process can be improved but it provides intuitive and customized dashboards.
What is most valuable?
How has it helped my organization?
It automated and completed the user's Life Cycle management (which was manual in many cases), while validation of user's access is being performed for any of his Access Requests. More than that, it helped to build a firm RBAC module with its Role Mining tool and it helped the organization to lower the risk of access to critical applications by non-authorized users and by that it helped push the organization to compliance and readiness for auditing and regulations approval.
What needs improvement?
The installation process can be improved. The Workflow Designer interface can be improved as well.
For how long have I used the solution?
For about a year.
Buyer's Guide
Identity Management (IM)
May 2025

Find out what your peers are saying about OpenText, SailPoint, One Identity and others in Identity Management (IM). Updated: May 2025.
851,604 professionals have used our research since 2012.
What was my experience with deployment of the solution?
Not particularly.
What do I think about the stability of the solution?
No issues encountered.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and support?
Pretty satisfying.
Which solution did I use previously and why did I switch?
No previous solution used.
How was the initial setup?
Was a bit complex, the Installation process can be definitely improved and re-designed. There is no installation wizard. Instead, lots of manual third party software installations and configurations.
What about the implementation team?
We used a vendor team who were very high skilled.
What was our ROI?
Calculating ROI for identity-audit-risk management solutions is hard, because you cannot measure in bills what breaches you prevented and what these potential breaches financial damage could be. Anyway I could say that in terms of financial saving, this solution saved a lot of long manual expensive audits right after the very first project stage of getting visibility.
Which other solutions did I evaluate?
- RSA-Aveksa
- CA-Eurikify
What other advice do I have?
Put 80% of your focus on the business process design (not on the technological side at all!) - and do it way before the project has even begun. Do not forget that it's a business-focused project so start from defining the business demands, then go to a final business design - only after - initiate the the technical project.
Disclosure: I am a real user, and this review is based on my own experience and opinions.


Buyer's Guide
Download our free Identity Management (IM) Report and find out what your peers are saying about OpenText, SailPoint, One Identity, and more!
Updated: May 2025
Product Categories
Identity Management (IM)Popular Comparisons
SailPoint Identity Security Cloud
One Identity Manager
Symantec Identity Governance and Administration
OpenText Identity and Access Management
Buyer's Guide
Download our free Identity Management (IM) Report and find out what your peers are saying about OpenText, SailPoint, One Identity, and more!
Quick Links
Learn More: Questions:
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best legacy IDM solution for SAP GRC?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- When evaluating Identity and Access Management, what aspect do you think is the most important to look for?
- What access management tools would you recommend to help with GDPR compliance?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?