Network Engineer at a retailer with 51-200 employees
“A smart identity management solution that adds to your business advantage”
What is most valuable?
• Allows individual users to work in a controlled and secure environment, whereby user authentication, access control, password administration, and smooth workflow are ensured.
• Even if a user forgets theirs access information or password, Identity Manager helps users to restore access. This reduces the cost of help-desk support while making the daily operations much smoother.
• Large sized organizations require Identity Manager to ensure that their network and systems are secure for use or for access by delegated users.
• It ensures that business workflow is in compliance with secure standards of technology infrastructure.
What needs improvement?
• Cost is the only demerit of Identity Manager because it requires updates of software and technology as users keep multiplying. Identity Manager is also prone to hackers and therefore needs to be regularly checked for security threats and intrusions.
• Users must be trained to use the system.
What other advice do I have?
Medium to large sized organizations require Identity Manager in order to allocate their technology costs in a much better way. After a one time heavy installation cost, companies do not need to worry about user password/access issues that may occur on a daily basis.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Tech Support Staff at a tech company with 51-200 employees
Identity manager is an identity management tool for administrators that governs and manages the identities of users, their access to the system, roles, and what they are allowed to do with data they have access to.
Valuable Features:
• Identity manager enables automated processes of entitlements, management as well as deletion, and creation of user accounts.
• Access to all enterprise systems like relational databases can be managed efficiently.
• Identity manager decentralizes group membership and role management, by allowing administration of delegated users, and therefore scalability and less maintenance can be achieved.
It is flexible, reduces the costs of administration and increases accountability, improves security, and lowers help desk workloads.
Room for Improvement:
Identity manager is very complex and you must have the knowledge and skills required to use it. It is also a bit expensive, but its benefits outweigh all these cons.
Other Advice:
Identity manager is designed to improve business security and compliance and efficiency by automating identity controls, which increases flexibility and agility of IT and businesses. It can be deployed on-site or as virtual and cloud services. It incorporates very critical features, like a module for structured administration, integrated compliance support and workflows, and self-services for users. I have used it for more than one year now.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Symantec Identity Governance and Administration Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
SailPoint Identity Security Cloud
One Identity Manager
Microsoft Identity Manager
One Identity Active Roles
SAP Identity Management
Oracle Identity Governance
NetIQ Identity Manager
OpenIAM Identity Governance
SecureAuth Identity Platform
AlertEnterprise Guardian
NetIQ Identity Governance
Buyer's Guide
Download our free Symantec Identity Governance and Administration Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between SailPoint and CA IDM?
- SailPoint IdentityIQ vs. CA Identity Governance
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best legacy IDM solution for SAP GRC?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- When evaluating Identity and Access Management, what aspect do you think is the most important to look for?
How is this app prone to hackers? Please elaborate the difference between this J2EE application and another. That's a pretty broad statement.