Identity and Access Management
SoftwareReviews names Symantec Identity Security, Microsoft Identity Manager, and HID DigitalPersona as Identity and Access Management Data Quadrant Award Winners.
View Category
Data Quadrant
Data Quadrants are proudly founded in 100% user review data and are free of traditional
“magical” components such as market presence and analyst opinion, which are opaque in nature
and may be influenced by vendor pressure, financial or otherwise.
The SoftwareReviews Data Quadrant evaluates and ranks products based on feedback from IT
and business professionals. The placement of a software in the Data Quadrant indicates its
relative ranking as well as its categorization.
Read The In-Depth Report
A thorough evaluation and ranking of all software in an individual category to compare
software across every dimension.
- user satisfaction rankings
- |
- vendor capability comparisons
- |
- business value scores
- |
- individual feature evaluations
- |
- emotional connection to products
Download Report
View Preview
Note The axes ranges are dynamically adjusted based on minimum and maximum values in the dataset
Software Experience
When distilled down, the software experience is shaped by both the experience with the software
and the relationship with the vendor. Evaluating enterprise software along these two dimensions
provides a comprehensive understanding of the product and helps identify vendors that can deliver on both.
Product Features and Satisfaction
The satisfaction is captured in the overall satisfaction score, which is driven by the likelihood
of users to recommend the software, combined with user satisfaction across top product features.
Vendor Experience and Capabilities
The vendor relationship is calculated in a weighted average of the satisfaction scores tied to vendor
capabilities (e.g. software implementation, training, customer support, product roadmap) as well as
emotional response ratings toward the vendor (e.g. trustworthy, respectful, fair).
Symantec
Balance digital trust and great user experiences—in any environment, on any device, and through any application.
8.1
Composite
Score
Composite
Score
+83
Emotional
Footprint
Emotional
Footprint
81%
Likeliness to
Recommend
Likeliness
to Recommend
Microsoft
Synchronize identities between directories, databases and applications. Enable self-service password, group and certificate management. Increase admin security and thwart identity theft with policies, privileged access and roles.
7.7
Composite
Score
Composite
Score
+76
Emotional
Footprint
Emotional
Footprint
81%
Likeliness to
Recommend
Likeliness
to Recommend
HID Global
The HID DigitalPersona software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages an array of easily deployable authentication methods so users can quickly and easily gain access to their cloud applications, such as Microsoft 365, VPNs, corporate networks, Windows desktops, Citrix applications and more. Crossmatch was acquired by HID Global in September 2018.
7.7
Composite
Score
Composite
Score
+75
Emotional
Footprint
Emotional
Footprint
81%
Likeliness to
Recommend
Likeliness
to Recommend
Availability and Quality of Training
Symantec Identity Security
Breadth of Features
Symantec Identity Security
Business Value Created
Symantec Identity Security
Ease of Customization
Symantec Identity Security
Ease of Data Integration
Symantec Identity Security
Ease of IT Administration
IBM Security Identity Manager
Ease of Implementation
Symantec Identity Security
Product Strategy and Rate of Improvement
Symantec Identity Security
Quality of Features
Symantec Identity Security
Usability and Intuitiveness
Symantec Identity Security
Vendor Support
Symantec Identity Security
Availability and Quality of Training
Symantec Identity Security
Breadth of Features
Symantec Identity Security
Business Value Created
Symantec Identity Security
Ease of Customization
Symantec Identity Security
Ease of Data Integration
Symantec Identity Security
Ease of IT Administration
IBM Security Identity Manager
Ease of Implementation
Symantec Identity Security
Product Strategy and Rate of Improvement
Symantec Identity Security
Quality of Features
Symantec Identity Security
Usability and Intuitiveness
Symantec Identity Security
Vendor Support
Symantec Identity Security
SAP
Safeguard your company's information assets with identity and access management and security compliance. Manage business continuity and minimize cost and risk with an approach to identity and access management that drives security compliance.
7.3
Composite
Score
Composite
Score
+70
Emotional
Footprint
Emotional
Footprint
72%
Likeliness to
Recommend
Likeliness
to Recommend
IBM
IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.
7.3
Composite
Score
Composite
Score
+70
Emotional
Footprint
Emotional
Footprint
73%
Likeliness to
Recommend
Likeliness
to Recommend
RSA
RSA Via is a set of SaaS and software solutions that work together to protect the entire identity and access lifecycle. It features a governance-driven approach to ensure consistency in access controls, regardless of the user’s location, device or where the resources reside. RSA Via ensures continuous compliance with changing rules and regulations without rendering current IAM investments obsolete.
7.2
Composite
Score
Composite
Score
+70
Emotional
Footprint
Emotional
Footprint
74%
Likeliness to
Recommend
Likeliness
to Recommend
Okta, Inc
Okta's products manage identity and access for millions of people on millions of devices. We offer products in two lines: IT Products and Platform.
7.2
Composite
Score
Composite
Score
+62
Emotional
Footprint
Emotional
Footprint
77%
Likeliness to
Recommend
Likeliness
to Recommend
Oracle
Oracle’s complete, integrated next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs. Achieve rapid compliance with regulatory mandates. Secure sensitive applications and data—regardless of whether they are hosted on premises or in the cloud.
7.0
Composite
Score
Composite
Score
+62
Emotional
Footprint
Emotional
Footprint
74%
Likeliness to
Recommend
Likeliness
to Recommend
For the full list of vendors in this space, click here.
SoftwareReviews Gold Medal Awards recognize outstanding vendors in the technology marketplace as evaluated by their users. Gold Medals are the capstone of an in-depth software evaluation report, and awarded using a proprietary, transparent methodology based on a composite satisfaction score that averages four different areas of evaluation: Net Emotional Footprint, Vendor Capabilities, Product Features, and Likeliness to Recommend. The Net Emotional Footprint Score measures user emotional response ratings of the vendor (e.g. trustworthy, respectful, fair). The top 5 vendors in a software category are eligible for awards pending composite scores achieve a sufficiently high satisfaction threshold.
Software Reports present comprehensive evaluations of software vendors on the above elements. Software buyers can use this data to make more informed, data-driven software purchasing and renewal decisions.