Identity Management Solutions - Reviews

Overall Rating

Reviewer's Company Size

Vendor

Product

Last Updated

Industry

Department

Experience

Job Type

Role

Reviews (126-150 of 322)

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source

JumpCloud allows us to have a single user directory across all on-premise and hosted servers instead of one for each location(local, one per AWS Region, GCP, etc). Trying to manage the numerous user directories and users remembering their credentials was more work than it was worth. Groups of use...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Well-suited for teams with spread out employees or those with many logins. Basically, anyone who cares about cybersecurity needs this.

Anonymous | TrustRadius Reviewer
May 24, 2019

Microsoft Azure

Score 10 out of 10
Vetted Review
Verified User
Review Source

We recommend, with trust, Azure Active Directory. A mature solution to manage users and grant access to company resources. Very good integrations and easy management. Easy to update and migrate. Single sign-on, modern authentication, and Multi-Factor Authentication are must-haves that all small a...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

We use 1Password internally for each of our employees to have a secure and managed password storage solution. The primary reason we purchased it, and its strongest use for us, is as a way to securely share passwords among employees, as well as securely storing client secure information (various l...

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source

Only admins in IT use it. We manage the Dataowner and the Permissions they wanna give to their Users. With ARM we have completely restructured our main File Server and then have redone all of the Permissions based on what the Dataowner wants. We work closely with the Dataowner to make sure everyt...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Creates dynamic groups and flexible Active Directory configurations. Improves our automation capabilities. Helps us to automate a part of our Active Directory administration process. Helps us to automate the process of registration and cleaning the computer accounts with Active Directory. Helps u...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

ARM is being used by our IT department mainly for auditing of Active Directory, file server permissions, and Exchange mailbox access. ARM has allowed for visualization of permissions that allow users access to specific resources. Being able to visualize the permissions and access through a single...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

There are other options out there that are more complicated to use. If you want your family members to use a security feature like this, then LastPass is the one to recommend. If you have friends who aren't very tech-savvy, this is as straightforward as it gets. Works well and is very easy to get...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

I can't imagine a scenario where this isn't appropriate. Its been great at getting users with multiple accounts scattered around lots of websites, to resolve their constant reuse of passwords and improve security. We still need to review if there is a teams option as the next issue to resolve is ...

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

LastPass is currently being used across almost our entire organization. Throughout our company, we have hundreds of systems and tools that are used by many employees. LastPass allows everyone to keep their login information secure and organized. This has significantly reduced the stress on our IT...

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source

With Auth0, we saved a lot of time and money implementing identity management that would work across all of our services instead of doing it ourselves.

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

OneLogin is an awesome tool to give to your company. Instead of remembering a kajillion passwords, you have one password for EVERYTHING! Just integrate the apps and you are good to go. Integration will take some time but once that's is done, your team and company will love it, trust me!

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source

We were using ObserveIT across IT and in IT-related departments. It was purchased to provide more detailed logs to be used in SIEM and provide evidence by taking screen captures of users' activities when a problem occurs.

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source

IBM App ID is well-suited in scenarios where you need to enhance security and authentication, email/password verification, and SDKs. For example, if you are developing an application that will require logins - IBM App ID will be incredibly useful in the authentication of that information. Additio...

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source

It is suited everywhere due to the number of cyber attacks and malicious attempts to steal identities or information. The additional layer of security and integration with corporate apps leaves no room for hackers. It helps to track devices where the user logs in and simplifies the security audit...

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source

Easy to use and to manage your Microsoft AD environment, FileRights, and AD Objects and Exchange. Perfect to track your AD changes and GPDR. We have been using it for three years now. Perfect German support.

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source

SolarWinds Access Rights Manager is used by our IT department for the quarterly access reviews for audit purposes. We managed to shave hours off the process of generating the report of who has access to what, and now we can even schedule it—pure automation. That was the main reason for the purcha...

Anonymous | TrustRadius Reviewer
February 14, 2019

IBM App ID for mobile dev

Score 7 out of 10
Vetted Review
Verified User
Review Source

We use it to authenticate our mobile apps. Mostly to get social media login support.

Jennifer Hess | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source

1Password is ideal for securely storing credentials and sharing within a team. Also, having a secure resource for storing sensitive client data (logins, payment methods) is important for mitigating liability. The setup process is a bit complex, but once everything is established, the system is fa...

Maison Tan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

LastPass solves the issue of username and password storage. It is a valid concern these days with hackers trying to gain access to an organization's data. When access to a certain site is required by different users, by limiting the number of users who have access to see the actual password, woul...

Matt Heerema | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Unique, strong passwords are a requirement in this era of ubiquitous and automated hacking. You should never use a password fewer than 12 characters that you can remember, and never use passwords that contain any remotely personal information. I see weak passwords from clients constantly, primari...

Fedor Paretsky | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source

Auth0 is great for companies that can afford to scale up their service with Auth0 included, and for companies that are looking to quickly implement an auth provider for a lower number of users. For companies that need an auth provider that works at scale, it is probably a better idea to use a lib...

Jamie Elliott | TrustRadius Reviewer
January 22, 2019

RSA and the benefits

Score 7 out of 10
Vetted Review
Verified User
Review Source

The RSA was originally brought in for 2-factor authentication, which was used in conjunction with our internal Active Directory. This allowed us to secure our remote user connections and our internal user connections for PCI access. Later we tied it into ISE for secure wireless access.