The procedures of installing basic user access levels, for various entities in our firm, were easy to perform. The audit and compliance functionality also contain records of events and user actions that are so vital in most regulatory circumstances. Review collected by and hosted on G2.com.
It appears that Deep Identity is not as flexible to accommodate all of our more diverse access control requirements. This becomes important as our organization continues to expand and different departments’ work involve more specific permissions. Review collected by and hosted on G2.com.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.
