Microsoft Identity Lifecycle Manager
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Despite a large field of battle-tested competitors, Microsoft's legacy identity product narrowly surpassed IBM for our No.1 ranking. Identity Lifecycle Manager 2007, which was replaced in March by Forefront Identity Manager 2010, features identity synchronization, user provisioning, and management of certificates and smartcards; it requires Windows Server 2003 or 2008 and SQL Server. Readers gave it solid marks across the board, particularly for ease of use, integration with associated products and comprehensive and flexible reports.
IBM Tivoli Identity Manager
Big Blue's user provisioning and role management software offers automated provisioning and self-service interfaces, discrepancy discovery comparing access to privileges, simulated policy verification assessment, centralized Web-based administration and compliance-focused auditing and reporting. Readers especially liked IBM Tivoli Identity Manager's integration and compatibility with associated products, as well as its scalability and extensibility – the breadth of platforms, applications, and domains it covers. The product received only average marks for overall ROI.
RSA Access Manager
RSA, The Security Division of EMC
Finishing a close third, RSA Access Manager governs access to Web applications and consumer-facing applications with features such as centralized identity and privilege management, single sign-on, user authentication and authorization and support for APIs including Java and WSI. Readers gave 2009's gold winner high marks for its ease of use, and also liked its integration with associated products, scalability and ease of installation, configuration and administration. The product's reporting and vendor support received only average marks.
2010 READERS' CHOICE AWARDS
Best Antimalware Products
Best Authentication Products
Best Data Loss Prevention Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Messaging Security Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products