[GOLD]
Microsoft Identity Lifecycle Manager
Microsoft
Despite a large field of battle-tested competitors, Microsoft's legacy identity product narrowly surpassed IBM for our No.1 ranking.
Requires Free Membership to View
[SILVER]
IBM Tivoli Identity Manager
IBM
Big Blue's user provisioning and role management software offers automated provisioning and self-service interfaces, discrepancy discovery comparing access to privileges, simulated policy verification assessment, centralized Web-based administration and compliance-focused auditing and reporting. Readers especially liked IBM Tivoli Identity Manager's integration and compatibility with associated products, as well as its scalability and extensibility – the breadth of platforms, applications, and domains it covers. The product received only average marks for overall ROI.
[BRONZE]
RSA Access Manager
RSA, The Security Division of EMC
Finishing a close third, RSA Access Manager governs access to Web applications and consumer-facing applications with features such as centralized identity and privilege management, single sign-on, user authentication and authorization and support for APIs including Java and WSI. Readers gave 2009's gold winner high marks for its ease of use, and also liked its integration with associated products, scalability and ease of installation, configuration and administration. The product's reporting and vendor support received only average marks.
2010 READERS' CHOICE AWARDS
Best Antimalware Products
Best Authentication Products
Best Data Loss Prevention Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Messaging Security Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
This was first published in September 2010
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation