RSA Access Manager
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
RSA Access Manager, formerly known as ClearTrust tackles the enormously complex challenge of Web access management, with single sign-on and other key access management features for complex internal, external and extranet environments. Users were particularly impressed with its integration with associated products and directories, its scalability across the extended enterprise and ease of use.
Sun Microsystems Identity Manager
Sun's Identity Manager, as well as companion products Identity Compliance Manager and Role Manager, was second by the narrowest of margins. Its role-based user provisioning and other capabilities make it a powerful tool for identity management and auditing across the enterprise and extranet. It earned its highest reader marks in extensibility and end user transparency.
Citrix Password Manager
Citrix Password Manager, now bundled as a feature of application virtualization product, helps organizations tackle the persistent headache of dealing with hundreds and thousands of user passwords, including self-service to ease help desk burdens. Readers gave it solid grades in all categories, including end user transparency, scalability, and ease of installation, configuration and administration.
"Suites aren't as integrated as many clients believe. There is considerable effort on the part of suite vendors to provide better integration. Most suites (exception is Novell) were acquired product by product over time, so many of them have completely different underlying architectures. Enterprises tend to be responsive to the suite idea because of the relationship it creates with the vendor." -- Earl Perkins, research vice president, Gartner
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products