Feature

Best Identity and Access Management Products 2009

[GOLD]
RSA Access Manager
RSA

RSA Access Manager, formerly known as ClearTrust tackles the enormously complex challenge of Web access management, with single sign-on and other key access management features

    Requires Free Membership to View

for complex internal, external and extranet environments. Users were particularly impressed with its integration with associated products and directories, its scalability across the extended enterprise and ease of use.

[SILVER]
Sun Microsystems Identity Manager
Sun Microsystems

Sun's Identity Manager, as well as companion products Identity Compliance Manager and Role Manager, was second by the narrowest of margins. Its role-based user provisioning and other capabilities make it a powerful tool for identity management and auditing across the enterprise and extranet. It earned its highest reader marks in extensibility and end user transparency.

[BRONZE]
Citrix Password Manager
Citrix Systems

Citrix Password Manager, now bundled as a feature of application virtualization product, helps organizations tackle the persistent headache of dealing with hundreds and thousands of user passwords, including self-service to ease help desk burdens. Readers gave it solid grades in all categories, including end user transparency, scalability, and ease of installation, configuration and administration.

[TRENDS]
"Suites aren't as integrated as many clients believe. There is considerable effort on the part of suite vendors to provide better integration. Most suites (exception is Novell) were acquired product by product over time, so many of them have completely different underlying architectures. Enterprises tend to be responsive to the suite idea because of the relationship it creates with the vendor." -- Earl Perkins, research vice president, Gartner


2009 READERS' CHOICE AWARDS

  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products

This was first published in September 2009

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: