Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Best Identity and Access Management Products 2009

Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.

RSA Access Manager

RSA Access Manager, formerly known as ClearTrust tackles the enormously complex challenge of Web access management, with single sign-on and other key access management features for complex internal, external and extranet environments. Users were particularly impressed with its integration with associated products and directories, its scalability across the extended enterprise and ease of use.

Sun Microsystems Identity Manager
Sun Microsystems

Sun's Identity Manager, as well as companion products Identity Compliance Manager and Role Manager, was second by the narrowest of margins. Its role-based user provisioning and other capabilities make it a powerful tool for identity management and auditing across the enterprise and extranet. It earned its highest reader marks in extensibility and end user transparency.

Citrix Password Manager
Citrix Systems

Citrix Password Manager, now bundled as a feature of application virtualization product, helps organizations tackle the persistent headache of dealing with hundreds and thousands of user passwords, including self-service to ease help desk burdens. Readers gave it solid grades in all categories, including end user transparency, scalability, and ease of installation, configuration and administration.

"Suites aren't as integrated as many clients believe. There is considerable effort on the part of suite vendors to provide better integration. Most suites (exception is Novell) were acquired product by product over time, so many of them have completely different underlying architectures. Enterprises tend to be responsive to the suite idea because of the relationship it creates with the vendor." -- Earl Perkins, research vice president, Gartner


  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products
This was last published in September 2009

Dig Deeper on Enterprise identity and access management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.