Idaptive vs Oracle Identity Governance
Last Updated:Our analysts compared Idaptive vs Oracle Identity Governance based on data from our 400+ point analysis of IAM Software, user reviews and our own crowdsourced data from our free software selection platform.
Product Basics
Product Assistance
Product Insights
Product Ranking
User Sentiment Summary
Synopsis of User Ratings and Reviews
How "Idaptive" is CyberArk's solution for identity access management, but is it adaptable enough to earn positive user reviews? CyberArk Idaptive users praise the software for its robust security features, which leverage big data and machine learning to protect against unauthorized access. For example, one user specifically lauded Idaptive's ability to provide top-notch security for both regular users and accounts with elevated privileges, effectively guarding against malware and unauthorized access attempts. Users also appreciate the software's single sign-on (SSO) capabilities, which streamline access to multiple applications with a single set of credentials. This feature is particularly valuable for businesses with a large number of applications, as it simplifies the user experience and reduces the risk of password fatigue. However, the software's user interface has been criticized as being less intuitive than those offered by competitors like Okta and Microsoft Azure Active Directory. Some users have also reported that the pricing structure for Idaptive can be difficult to understand, especially when adding additional features or users. While these drawbacks are notable, they do not overshadow the software's strengths in security and SSO. Overall, CyberArk Idaptive is a good choice for enterprises that prioritize security and need a scalable IAM solution that can handle both cloud and on-premises applications. Its robust security features and SSO capabilities make it a valuable tool for businesses looking to protect sensitive data and streamline user access. However, organizations that place a high value on user experience and transparent pricing may want to consider alternative solutions.
Is Oracle Identity Governance the keymaster to your organization's digital kingdom? User reviews from the past year suggest that Oracle Identity Governance (OIG) is a robust and powerful solution for managing identity and access needs, particularly for large enterprises. Users praise OIG for its extensive customization options, allowing it to adapt to unique application requirements. Its seamless integration with both on-premise and cloud environments makes it a versatile choice for organizations embracing hybrid models. A significant strength highlighted by users is OIG's comprehensive user lifecycle management, a critical aspect of maintaining a secure and compliant environment. The platform's automation capabilities, particularly in role and policy management, streamline administrative tasks and improve efficiency. Users also appreciate OIG's strong compliance features, such as bulk approval for low-risk access requests and detailed access reviews, which are essential for organizations operating under stringent regulatory requirements.However, some users find the initial setup and configuration process to be complex and time-consuming, potentially posing a challenge for organizations without dedicated IT resources. There are also mentions of the user interface being less intuitive, which could impact the ease of use for new users. Despite these drawbacks, OIG's strengths lie in its robust feature set, ability to handle complex identity governance tasks, and strong compliance support. This makes it most suitable for large enterprises and organizations with complex IT environments that require a high level of customization, automation, and security.
Screenshots
Top Alternatives in IAM Software
AD360
AWS IAM
Cisco Duo
Cloud Identity
Customer Identity Cloud
CyberArk Workforce Identity
Entra ID
Entra ID Governance
Entrust Identity Enterprise
IBM Security Verify
JumpCloud
OneLogin
Oracle Identity and Access Management
Passly
Ping Identity
RSA ID Plus
SafeNet Trusted Access
SailPoint Identity Security Cloud
Workforce Identity Cloud
FAQ
We’re the employee-owned Austin-based startup democratizing software data so you can make your decisions in an influence-free zone. Our market data is crowdsourced from our user-base of 100,000+ companies.
WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...