Passly by ID Agent vs. Deep Identity Privilege Identity Manager (PIM)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Passly by ID Agent
Score 2.3 out of 10
N/A
Passly from ID Agent, a Kaseya company and the service that replaces the former AuthAnvil, is an identity and access management (IAM) platform providing two-factor authentication, single sign-on (SSO) and password management.N/A
Deep Identity Privilege Identity Manager (PIM)
Score 7.0 out of 10
N/A
Deep Privilege Identity Manager (Deep PIM) is presented by the vendor as a practical and nonintrusive solution to address privilege identity related challenges in any organizations. Deep PIM is built as plug-ins on top of Deep Identity Manager (Deep IM) and comes with Privilege Access Server, which will act as proxy for access to back-end Windows and Unix servers. Deep PIM is an integrated solution with Deep IACM and Deep IM. With it, the vendor states that organizations can…N/A
Pricing
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Features
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Identity Management
Comparison of Identity Management features of Product A and Product B
Passly by ID Agent
6.8
5 Ratings
19% below category average
Deep Identity Privilege Identity Manager (PIM)
-
Ratings
ID-Management Access Control9.22 Ratings00 Ratings
ID Management Single-Sign On (SSO)9.63 Ratings00 Ratings
Multi-Factor Authentication1.05 Ratings00 Ratings
Password Management9.92 Ratings00 Ratings
Account Provisioning and De-provisioning1.03 Ratings00 Ratings
ID Management Workflow Automation10.01 Ratings00 Ratings
Best Alternatives
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Small Businesses
Dashlane Password Manager
Dashlane Password Manager
Score 9.1 out of 10
Dashlane Password Manager
Dashlane Password Manager
Score 9.1 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Likelihood to Recommend
1.0
(7 ratings)
-
(0 ratings)
Usability
9.0
(1 ratings)
-
(0 ratings)
Support Rating
7.1
(2 ratings)
-
(0 ratings)
User Testimonials
Passly by ID AgentDeep Identity Privilege Identity Manager (PIM)
Likelihood to Recommend
Kaseya
If you have a skilled IT support team (whether in-house or outsourced) that is familiar with Kaseya's applications and has a good relationship with the vendor, it may be a good fit. It "checks the box" for 2FA, but there are much simpler solutions out there today that can get the same job done with less complexity and, in many cases, at a lower cost.
Read full review
Trusted Services Pte Ltd
No answers on this topic
Pros
Kaseya
  • AuthAnvil is simple to use. Whether using an OTP code or push notifications, the application is user-friendly.
  • AuthAnvil applications are easy for the end-user to install.
  • AuthAnvil is readily available across multiple platforms (Windows, Android, iOS).
Read full review
Trusted Services Pte Ltd
No answers on this topic
Cons
Kaseya
  • Does not offer faster login for trusted devices.
  • App requires multiple clicks to get to security code.
  • App is slow to load.
  • App was difficult to install and pair and confirm as a trusted device. That process took over 30 minutes.
Read full review
Trusted Services Pte Ltd
No answers on this topic
Usability
Kaseya
Simplicity of use combined with price and low system resources.
Read full review
Trusted Services Pte Ltd
No answers on this topic
Support Rating
Kaseya
They are very helpful with helping us with any issues. There are a lot of helpful guides online if you get lost. Kaseya is also good about not bugging you with notifications. Kaseya offers easy to access to support options. Overall I have not had to contact them over a lot of issues. The software rarely broke or was down for maintenance.
Read full review
Trusted Services Pte Ltd
No answers on this topic
Alternatives Considered
Kaseya
I selected Passly at first as it would allow for a single sign on with azure to Kaseya VSA. Kaseya has made access to different products very different. VSA does not have single sign on with Azure where as Vorex/BMS does. This is a feature that Kaseya should make unified accross all applications.
Read full review
Trusted Services Pte Ltd
No answers on this topic
Return on Investment
Kaseya
  • Kaseya has allowed us to be more secure.
  • It's allowed us to link multiple 2FA devices to one account.
  • It's provided us with basic logging.
Read full review
Trusted Services Pte Ltd
No answers on this topic
ScreenShots

Deep Identity Privilege Identity Manager (PIM) Screenshots

Screenshot of The industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organizations.Screenshot of Deep PIM out-of-the-box integration with Deep IM allows usage of the access request and workflow technology for users in the organization to make request to access back-end servers with privilege identities.Screenshot of Secure Desktop functionality supports Microsoft Servers for privilege remote access. This secure desktop access allows users to connect to any windows servers without the need to know the privilege identity password of the target servers.Screenshot of Deep PIM provides comprehensive logging and recording of the privilege identity session. This logging and recording is done at the PIM-Gateway Server which acts as proxy for all access to target servers.