Best Identity and Access Management Products 2009

Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.

[GOLD]
RSA Access Manager
RSA

RSA Access Manager, formerly known as ClearTrust tackles the enormously complex challenge of Web access management, with single sign-on and other key access management features for complex internal, external and extranet environments. Users were particularly impressed with its integration with associated products and directories, its scalability across the extended enterprise and ease of use.

[SILVER]
Sun Microsystems Identity Manager
Sun Microsystems

Sun's Identity Manager, as well as companion products Identity Compliance Manager and Role Manager, was second by the narrowest of margins. Its role-based user provisioning and other capabilities make it a powerful tool for identity management and auditing across the enterprise and extranet. It earned its highest reader marks in extensibility and end user transparency.

[BRONZE]
Citrix Password Manager
Citrix Systems

Citrix Password Manager, now bundled as a feature of application virtualization product, helps organizations tackle the persistent headache of dealing with hundreds and thousands of user passwords, including self-service to ease help desk burdens. Readers gave it solid grades in all categories, including end user transparency, scalability, and ease of installation, configuration and administration.

[TRENDS]
"Suites aren't as integrated as many clients believe. There is considerable effort on the part of suite vendors to provide better integration. Most suites (exception is Novell) were acquired product by product over time, so many of them have completely different underlying architectures. Enterprises tend to be responsive to the suite idea because of the relationship it creates with the vendor." -- Earl Perkins, research vice president, Gartner


2009 READERS' CHOICE AWARDS

  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products
This was first published in September 2009

Dig deeper on Password Management and Policy

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close