Identity Governance Solution

Reviewed on 17/04/2019
Tuhin B.
Principal Architect
Computer & Network Security, 51-200 Employees
Used the Software for: 1+ year
Reviewer Source 
4/5
Overall
5 / 5
Ease of Use
5 / 5
Features & Functionality
3 / 5
Customer Support
5 / 5
Value for Money
Likelihood to Recommend:
Not Likely Extremely Likely

Comments: 1. Identity Governance
2. Access Governance
3. Certification
4. Control report
5. User life cycle management

Pros: 1. Cloud based with most enterprise applications granular level control and access identified.
2. Out of the box connector
3. Highly scalable
4. Robotics process embedded
5. Privileged Access at cloud based

Cons: Entire structure of scheme is less open
Very frequent update in version, hence less stable