Oracle Identity Management

Oracle Identity Management Alternatives & Competitors

Looking for alternatives to Oracle Identity Management? Tons of people want Privileged Access Management software. What's difficult is finding out whether or not the software you choose is right for you.

content
Market Segment

Top 20 Alternatives & Competitors to Oracle Identity Management

    #1
    #1
  1. AWS Identity and Access Management (IAM)

    (63)4.4 out of 5
    AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

    Reviewers say compared to Oracle Identity Management, AWS Identity and Access Management (IAM) is:

    Better at meeting requirements
    Better at support
  2. AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

    Reviewers say compared to Oracle Identity Management, AWS Identity and Access Management (IAM) is:

    Better at meeting requirements
    Better at support

    AWS IAM review by Agency in Computer Software
    "AWS core security feature: I like the level of control this gives me to my products in AWS. Giving me control to be as secure or open as I like. One of the best services out there and the fact you set it all up yourself means you know you are secure. Unlike other providers you just have to trust. they have great guides and support to help you and advice on the best configurations. "
    #2
    #2
  3. SecureLink for Enterprise

    (42)4.2 out of 5
    Trying to authenticate, provision, and audit a rotating population of support technicians is a challenge that often results in shared logins, security vulnerabilities, and a lack of vendor accountability. We deliver a purpose-built secure remote access platform that ensures industry compliance and vendor accountability.

    Reviewers say compared to Oracle Identity Management, SecureLink for Enterprise is:

    More expensive
    More usable
    Better at support
  4. Trying to authenticate, provision, and audit a rotating population of support technicians is a challenge that often results in shared logins, security vulnerabilities, and a lack of vendor accountability. We deliver a purpose-built secure remote access platform that ensures industry compliance and vendor accountability.

    Reviewers say compared to Oracle Identity Management, SecureLink for Enterprise is:

    More expensive
    More usable
    Better at support

    SecureLink for Enterprise review by Vignesh S.
    "Hassle free and Secure Remote Access: It is secure and enables multiple remote session without causing any lag or disconnect of the sessions. The level of connecting to various third-party remote access is just awesome and gave full control to support the enterprise clients during my job. It has also provided the control of turning ON/OFF of the gatekeepers for the clients by ensuring controlled across to the business. It also provides the dashboard like the feature where the administrator or user can monitor the sessions in use and can take necessary actions. Securelink also enables the user irrespective of the admin to add the remote server without any issue and enables the user/admin to search the gatekeeper, host, and customer with the various search filters. And this awesome!!!"
    #3
    #3
  5. Foxpass

    (34)4.8 out of 5
    Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.

    Reviewers say compared to Oracle Identity Management, Foxpass is:

    More usable
    Better at support
    Better at meeting requirements
  6. Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.

    Reviewers say compared to Oracle Identity Management, Foxpass is:

    More usable
    Better at support
    Better at meeting requirements

    Foxpass review by Chris B.
    "Hands on, amazing technical support: A live video tech support call with Foxpass. We had a major config problem with our Snom phone setup and using LDAP as a central directory. Travis got on a personal call with us, Google Hangouts and we even called our VOIP tech support people at the same time on another phone and has a 3 way conversation including sniffing network packets and lots of things which made no sense to me. We managed to work out that our SNOM phones were using an insecure version of TLS to do their LDAP lookups. There is no way I would have been able to detect what the issue was myself - Travis and Foxpass were absolute experts."
    #4
    #4
  7. JumpCloud

    (24)4.5 out of 5
    JumpCloud is a directory-as-a-service (DaaS), designed to securely connect employee identities to IT resources- devices, apps, & networks.

    Reviewers say compared to Oracle Identity Management, JumpCloud is:

    Better at support
    More usable
    Better at meeting requirements
  8. JumpCloud is a directory-as-a-service (DaaS), designed to securely connect employee identities to IT resources- devices, apps, & networks.

    Reviewers say compared to Oracle Identity Management, JumpCloud is:

    Better at support
    More usable
    Better at meeting requirements

    JumpCloud review by Matt C.
    "Game Changer for modern Identity and Systems Management: The company itself makes this product amazing. Customer service is top notch. The product offers so much more than first appears when looking at their website. Not only do you gain the ability to manage user directories, but SSO access to dozens of common platforms, systems management through policies tailored for all three major platforms (Win, Linux, Mac). Full API management capabilities through shell or Power Shell libraries make it almost infinitely customizable to your needs."
    #5
    #5
  9. Thycotic Secret Server

    (18)4.6 out of 5
    Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price.

    Reviewers say compared to Oracle Identity Management, Thycotic Secret Server is:

    Better at meeting requirements
    More usable
    Better at support
  10. Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price.

    Reviewers say compared to Oracle Identity Management, Thycotic Secret Server is:

    Better at meeting requirements
    More usable
    Better at support

    Thycotic review by Administrator in Computer Software
    "Great solution if you want to keep your password vaults on-premise.: I really like that you can completely host a copy of the software internally so you don't have to worry about exposing your passwords to the Internet. We have a self-hosted edition of Thycotic Secret Server (TSS for short) that supports multiple teams and thousands of passwords. It works really well for that scenario and we don't have to worry about our vault being compromised by outside forces."
    #6
    #6
  11. AWS Directory Service

    (18)4.2 out of 5
    AWS Directory Service is a service that setup and run Microsoft Active Directory (AD) in the AWS cloud, or connect AWS resources with an existing on-premises Microsoft Active Directory and can use it to manage users and groups, provide single sign-on to applications and services, create and apply group policy, domain join Amazon EC2 instances, as well as simplify the deployment and management of cloud-based Linux and Microsoft Windows workloads.

    Reviewers say compared to Oracle Identity Management, AWS Directory Service is:

    Better at meeting requirements
    More usable
    Better at support
  12. AWS Directory Service is a service that setup and run Microsoft Active Directory (AD) in the AWS cloud, or connect AWS resources with an existing on-premises Microsoft Active Directory and can use it to manage users and groups, provide single sign-on to applications and services, create and apply group policy, domain join Amazon EC2 instances, as well as simplify the deployment and management of cloud-based Linux and Microsoft Windows workloads.

    Reviewers say compared to Oracle Identity Management, AWS Directory Service is:

    Better at meeting requirements
    More usable
    Better at support

    AWS Directory Service review by User in Higher Education
    "The Amazing Directory: The most interesting point is That This directory can be abled to interchange the data information added on administrative data of the cloud .Because in this way I can organize my employees, my groups of job, and devices which I have to administrate. On this idea order I can give different kind of jobs to my employees. "
    #7
    #7
  13. CyberArk

    (13)4.2 out of 5
    Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.

    Reviewers say compared to Oracle Identity Management, CyberArk is:

    Better at support
    Better at meeting requirements
    More usable
  14. Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.

    Reviewers say compared to Oracle Identity Management, CyberArk is:

    Better at support
    Better at meeting requirements
    More usable

    CyberArk review by Yesu Raju P.
    "One of the best credential storage tools available in market: CyberArk's privileged security is top notch and one of the best possible Account Security Solutions available currently in the market . Its enhanced security helped us to gain confidence among lot of our customers and most people are astonished at the level of privacy/security we use in our applications."
    #8
    #8
  15. AWS Secrets Manager

    (14)4.5 out of 5
    AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

    Reviewers say compared to Oracle Identity Management, AWS Secrets Manager is:

    Better at support
    Better at meeting requirements
    More usable
  16. AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

    Reviewers say compared to Oracle Identity Management, AWS Secrets Manager is:

    Better at support
    Better at meeting requirements
    More usable

    AWS Secrets Manager review by Drew M.
    "The secrets manager made it easy to store and retrieve secrets, passwords, and other sensitive keys: The ease of integration and availability the secrets manager provides. All of my services within AWS can access it easily with a little IAM permission magic. Tapping into this service was simple and effective."
    #9
    #9
  17. Workspace ONE

    (14)4.2 out of 5
    Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint management. It is available as a cloud service or for on-premises deployment.

    Reviewers say compared to Oracle Identity Management, Workspace ONE is:

    Better at meeting requirements
    Better at support
    More expensive
  18. Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint management. It is available as a cloud service or for on-premises deployment.

    Reviewers say compared to Oracle Identity Management, Workspace ONE is:

    Better at meeting requirements
    Better at support
    More expensive

    Workspace ONE review by Maximilian H.
    "Powerful Enterprise Mobility Management, Easy To Use: 1. The Workspace ONE / AirWatch UI is really clean and easy to navigate. Each major feature (mdm, mam, mcm, etc) has its own tab with several sub-tabs. You can customize it with the integrated branding options (logos + colors). 2. MDM: AirWatch's mobile device management capabilities have never been better. AirWatch supports every profile and command offered by Google / Apple. The profile management is solid and pretty much self explanatory. The device details page offers so much information it's almost overwhelming. 3. MCM: The integration options for the Workspace ONE Content app are amazing. You can integrate your complete on-premise or cloud file infrastrcture. The users will have the same permission that they have on a normal PC and can work on files from everywhere. It doesn't matter if you're using Microsoft or Dropbox in the cloud, AirWatch probably supports it. 4. Workspace ONE Apps: The AirWatch apps used to be really bad. They were slow, the UI was hideous and they didn't work properly most of the time. This has improved tremendously since VMware bought AirWatch. The new Boxer email app is beautiful and works flawless, so does the new Content, VMware Tunnel, Web and People app. 5. AirWatch Community: I'd say the community forums are more helpful than the support in 3 / 5 cases. There are some great and experienced people there, who are always willing to help out or discuss features."
    #10
    #10
  19. BeyondTrust Privileged Remote Access

    (12)4.0 out of 5
    Secure, manage, and audit vendor and internal remote privileged access without a VPN.

    Reviewers say compared to Oracle Identity Management, BeyondTrust Privileged Remote Access is:

    More usable
    Better at support
    Better at meeting requirements
  20. Secure, manage, and audit vendor and internal remote privileged access without a VPN.

    Reviewers say compared to Oracle Identity Management, BeyondTrust Privileged Remote Access is:

    More usable
    Better at support
    Better at meeting requirements

    BeyondTrust Privileged Remote Access review by Daniel S.
    "Bomgar: What I like the most about this Software is the way in which security is implemented in the connection and its way of sharing screens between users, allowing the rapidity when solving a problem with the software. It also keeps in memory the session beginnings of the implemented connections, which speeds up the process at the moment of reconnection."
    #11
    #11
  21. CA Identity Manager

    (12)3.2 out of 5
    Increase user productivity and business flexibility with user provisioning & identity management.
  22. Increase user productivity and business flexibility with user provisioning & identity management.

    CA Identity Manager review by User in Automotive
    "The CA Identity Management Solution is the Industry Leader: CA Identity Manager delivers a unified solution for user provisioning and user management that manages users’ identities throughout their entire life cycle, providing them with timely, appropriate access to applications and data. The user provisioning and identity management solutions that we offer can give users access to what they want when they need it."
    #12
    #12
  23. IBM Cloud Identity Service

    (12)3.8 out of 5
    One service to take care of every identity and access management (IAM) need - that's what Cloud Identity Service will mean for your business. For a similar investment as shallow cloud-based IAM products, which only represent federated SSO and a few other IAM capabilities, Cloud Identity Service enables you to adopt cloud for your entire IAM system.
  24. One service to take care of every identity and access management (IAM) need - that's what Cloud Identity Service will mean for your business. For a similar investment as shallow cloud-based IAM products, which only represent federated SSO and a few other IAM capabilities, Cloud Identity Service enables you to adopt cloud for your entire IAM system.

    Cloud Identity Service review by André B.
    "Un logiciel de sécurité fiable et inovant.: IBM Security Identity and Access Assurance centralise et automatise la gestion des profils utilisateur, l'authentification, les privilèges d’accès et les règles d'audit. Il complète le tout avec des fonctions de surveillance des utilisateurs et de rapports d'activités afin de détecter les situations non conformes à la politique de sécurité. Il vous permet d'améliorer l'assurance de l'identité, de réduire les risques de sécurité et de protéger vos ressources informatiques."
    #13
    #13
  25. Silverfort.io

    (10)4.9 out of 5
    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure.

    Reviewers say compared to Oracle Identity Management, Silverfort.io is:

    More usable
    Better at support
    Better at meeting requirements
  26. Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure.

    Reviewers say compared to Oracle Identity Management, Silverfort.io is:

    More usable
    Better at support
    Better at meeting requirements

    Silverfort.io review by Rodolfo O.
    "Tested as a potential addition to a suite of products offered to Government and Commercial customers: Its implementation is relatively simple. Made easy by Silverfort's custom scripting to integrate to a customer landscape. Dashboards are clean and concise. Syslog shipping makes it easy to collect LDAP and KRBGT events across an enterprise for later investigation and/or real time monitoring with a SIEM. Silverfort's turnaround time from new idea to feature is rather impressive. Testing against "Pass the Hash" attacks was thwarted every time. And most man-in-the-middle attacks as well. Two attacks other 2FA solutions fall short on more times than not."
    #14
    #14
  27. NetIQ Access Manager

    (7)4.2 out of 5
    Access Manager provides a simple yet secure and scalable solution that can handle all your web access needs—both internal as well as in the cloud.

    Reviewers say compared to Oracle Identity Management, NetIQ Access Manager is:

    Better at support
    Better at meeting requirements
    More usable
  28. Access Manager provides a simple yet secure and scalable solution that can handle all your web access needs—both internal as well as in the cloud.

    Reviewers say compared to Oracle Identity Management, NetIQ Access Manager is:

    Better at support
    Better at meeting requirements
    More usable

    NetIQ review by Michael G.
    "Enterprise Access Management: This tool is used to provide single sign-on / federated access to a suite of Java applications and reporting/collaboration tools. Licensing for this tool is calculated based on the number of users accessing the applications behind it so determining cost is as simple as counting the number of active accounts. The current versions of this tool can be installed as services on standard Redhat Enterprise servers which allows for easy integration into an environment where this operating system is already utilized. "
    #15
    #15
  29. Micro Focus Identity Manager

    (6)3.8 out of 5
    The comprehensive solution for provisioning identities and controlling access.

    Reviewers say compared to Oracle Identity Management, Micro Focus Identity Manager is:

    Better at meeting requirements
  30. The comprehensive solution for provisioning identities and controlling access.

    Reviewers say compared to Oracle Identity Management, Micro Focus Identity Manager is:

    Better at meeting requirements

    NetIQ Identity Manager review by Andreas R.
    "Solid product: The NetIQ access manager has all the functionality and stability we were looking for. It's a very mature product and very logical to use. While the documentation could be quite heavy, authentication worked solidly once hooked up. It's also extremely well documented."
    #16
    #16
  31. Intel Cloud SSO

    (4)4.3 out of 5
    Built on Force.com with standards-based SSO, 2-factor strong authentication via any mobile device, and account provisioning to hundreds of SaaS apps.
  32. Built on Force.com with standards-based SSO, 2-factor strong authentication via any mobile device, and account provisioning to hundreds of SaaS apps.

    Intel review by Livis F.
    "Identity in the cloud, for the cloud. : WHAT IS THE MOST THAT I LIKE THIS APPLICATION Intel analyzes the information of the computer system to help with the solution of problems that the device presents through Customer Assistance, this application is committed to protect the information of the users. "
    #17
    #17
  33. WSO2 Identity Server

    (5)4.5 out of 5
    Identity Server acts as an Enterprise Identity Bus (EIB) — a central backbone to connect and manage multiple identities regardless of the standards on which they are based.
  34. Identity Server acts as an Enterprise Identity Bus (EIB) — a central backbone to connect and manage multiple identities regardless of the standards on which they are based.

    WSO2 Identity Server review by Santiago B.
    "A very flexible and extensible solution, with an excellent service : It is very easy to extend the solution with different stores and functionalities, without break the core of the solution. The support of the technical and customer reps is asome."
    #18
    #18
  35. Google Cloud Identity & Access Management

    (6)5.0 out of 5
    Google Cloud Identity & Access Management (IAM) is a software that lets administrators authorize who can take action on specific resources, giving a full control and visibility to manage cloud resources centrally, it established enterprises with complex organizational structures, hundreds of workgroups and potentially many more projects to provides a unified view into security policy across entire organization, with built-in auditing to ease compliance processes.
  36. Google Cloud Identity & Access Management (IAM) is a software that lets administrators authorize who can take action on specific resources, giving a full control and visibility to manage cloud resources centrally, it established enterprises with complex organizational structures, hundreds of workgroups and potentially many more projects to provides a unified view into security policy across entire organization, with built-in auditing to ease compliance processes.

    Cloud Identity & Access Management review by Vicent P.
    "Complex cloud storage system.: Very good platform with which you can have resources on the web more safely, it is excellent because you create your own network so they can view and use the files."
    #19
    #19
  37. Oracle Identity Cloud Service

    (6)4.5 out of 5
    Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs. Achieve rapid compliance with regulatory mandates. Secure sensitive applications and data regardless of whether they are hosted on premises or in the cloud
  38. Oracle's complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs. Achieve rapid compliance with regulatory mandates. Secure sensitive applications and data regardless of whether they are hosted on premises or in the cloud

    Oracle Identity Cloud Service review by Sharan Y.
    "Oracle IDM: It has a wide application connecter list which it can be integrated with. Good life cycle management process and also approval workflows which can be customized. "
    #20
    #20
  39. Clearlogin

    (3)4.7 out of 5
    Clearlogin makes secure access to the cloud easy for users, IT administrators, and developers.
  40. Clearlogin makes secure access to the cloud easy for users, IT administrators, and developers.

    Clearlogin review by Soham S.
    "Access All Your Cloud From One Location: The best thing about clear login is its state of the art technology to access all cloud platforms such as google cloud,aws ec2 instance,microsoft azure,etc.It provides you one stop access to all the cloud platforms.Also you can add all other members and act as an admin and give them controlled access to the cloud platform.You can also view and track the login activity with minute details.Also you can do monotonous tasks with much ease.It also supports external directories for authentication thereby making a perfect and secured platform for accessing all your cloud resources over the web."