Deep Identity Privilege Identity Manager (PIM) vs. RSA Access Manager (Discontinued)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Deep Identity Privilege Identity Manager (PIM)
Score 7.0 out of 10
N/A
Deep Privilege Identity Manager (Deep PIM) is presented by the vendor as a practical and nonintrusive solution to address privilege identity related challenges in any organizations. Deep PIM is built as plug-ins on top of Deep Identity Manager (Deep IM) and comes with Privilege Access Server, which will act as proxy for access to back-end Windows and Unix servers. Deep PIM is an integrated solution with Deep IACM and Deep IM. With it, the vendor states that organizations can…N/A
RSA Access Manager (Discontinued)
Score 10.0 out of 10
N/A
The RSA Access Manager is an identity management that reached its end of sale in June 2019 (extended support will continue through 2021). As an identity and authentication solution RSA offers the SecurID Suite.N/A
Pricing
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Features
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Identity Management
Comparison of Identity Management features of Product A and Product B
Deep Identity Privilege Identity Manager (PIM)
-
Ratings
RSA Access Manager (Discontinued)
8.9
2 Ratings
8% above category average
ID-Management Access Control00 Ratings10.02 Ratings
ID Management Single-Sign On (SSO)00 Ratings10.02 Ratings
Multi-Factor Authentication00 Ratings10.02 Ratings
Password Management00 Ratings7.01 Ratings
Account Provisioning and De-provisioning00 Ratings7.01 Ratings
ID Management Workflow Automation00 Ratings9.01 Ratings
ID Risk Management00 Ratings9.01 Ratings
Best Alternatives
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Small Businesses
Dashlane Password Manager
Dashlane Password Manager
Score 9.1 out of 10
Dashlane Password Manager
Dashlane Password Manager
Score 9.1 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.7 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Likelihood to Recommend
-
(0 ratings)
10.0
(2 ratings)
User Testimonials
Deep Identity Privilege Identity Manager (PIM)RSA Access Manager (Discontinued)
Likelihood to Recommend
Trusted Services Pte Ltd
No answers on this topic
RSA Security
RSA helped to have a reliable services for the 2FA authentication
Read full review
Pros
Trusted Services Pte Ltd
No answers on this topic
RSA Security
  • Used in conjunction with our Active Directory for 2-factor authentication
  • The virtual RSA token for multiple devices makes it easy to avoid needing a physical device
  • The ability to leverage real-time analytics to identify when step-up is required
Read full review
Cons
Trusted Services Pte Ltd
No answers on this topic
RSA Security
  • The support for new LDAP version(389-DS)
Read full review
Alternatives Considered
Trusted Services Pte Ltd
No answers on this topic
RSA Security
Nothing as this point. At the end of 2019 we plan to start looking into alternatives
Read full review
Return on Investment
Trusted Services Pte Ltd
No answers on this topic
RSA Security
  • To be compliant with the Security Standards about the 2FA
Read full review
ScreenShots

Deep Identity Privilege Identity Manager (PIM) Screenshots

Screenshot of The industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organizations.Screenshot of Deep PIM out-of-the-box integration with Deep IM allows usage of the access request and workflow technology for users in the organization to make request to access back-end servers with privilege identities.Screenshot of Secure Desktop functionality supports Microsoft Servers for privilege remote access. This secure desktop access allows users to connect to any windows servers without the need to know the privilege identity password of the target servers.Screenshot of Deep PIM provides comprehensive logging and recording of the privilege identity session. This logging and recording is done at the PIM-Gateway Server which acts as proxy for all access to target servers.