Mfg.Part: AVK-PRODAPPLIANCE | CDW Part: 3227037
Availability: 1-3 Days
Advertised Price
Better Together
Quick View
Total Price:
RSA AVEKSA HW APP is rated4.00 out of5 by3.
Rated 5 out of 5 by from Configuration based tool that requires less coding compared to other IAM products.What is most valuable?It is a configuration based tool and requires less coding compared to other IAM products like SailPoint and OIM. It is very good in Access Governance for review processes.How has it helped my organization?Before implementing RSA Aveksa, our organization was facing following challenges:* Manual provisioning and de-provisioning for users account like AD, Exchange, Lync and other applications. Due to manual innervation it will take time for user on-boarding process and also data is not sync if any changes happened in HR source.* Leaver account was not disabled on time. It leads to audit compliance issue.* Audit compliance issue.* Access Request management is not available.After implementing RSA Aveksa, all the above mentioned issues have been resolved.What needs improvement?* The Access Provisioning process needs to be improved. Compared to other IAM tool the architecture of provisioning process is not up to the mark.* Tutorial and solution examples are lacking in RSA community center.* Customization flexibility is also minimal due to this sometimes not able to fulfill the organization's complex requirements.For how long have I used the solution?I have used this solution for last year and a half.What do I think about the stability of the solution?I did not encounter any stability issues.How is customer service and technical support?Customer Service: RSA Customer care support is also good compared to other IAM products.Technical Support: I would give technical support a rating of 8/10.Which solutions did we use previously?I wanted to learn and explore different IAM products. It would help me to achieve my career goal.How was the initial setup?The initial setup was straightforward. The installation is easy and mostly all the required documents are available for the initial setup.What's my experience with pricing, setup cost, and licensing?I was not involved in pricing and licensing. But I believe compared to other IAM products, the license cost is less.Which other solutions did I evaluate?We evaluated SailPoint Identity IQ and Novell Identity Manager.What other advice do I have?I would like to recommend this product. This product required very little customization and most of the solution can be developed using out of box features. For customers who have very complex requirements and require lots of customization, then I would recommend SailPoint Identity IQ.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-07-31T00:00:00-04:00
Rated 5 out of 5 by from The most valuable features are the identity store and the membership rules.What is most valuable?The most valuable features are the identity store and the membership rules.How has it helped my organization?HR is now our starting point. We have collectors to/from all back end systems.We are able to see all the misconfigurations in HR/ back end systems and we are able to correct them.Using membership rules saves us a lot of time. It is very important that we are in control.We are now able to assign roles based on HR attributes. Maintenance will be decreased.What needs improvement?* AFX collector/connector for SAP* Forms: Should be more flexible to manage fields* You cannot show fancy documents to the end-userFor how long have I used the solution?We started to work with this tool two weeks ago after a long preparation time.What do I think about the stability of the solution?The stability is good, when you put in enough resources.What do I think about the scalability of the solution?When running big collections/connections for the first time, we encountered some performance issues. However, with additional resources, this was fixed.How is customer service and technical support?Our implementer is Capgemini ( ) and they are OK.Which solutions did we use previously?We used AlertEnterprise ( ). In the past, no identity module was purchased. We switched due to the high cost of implementation.How was the initial setup?Because we were already working with the IAM tool, we already knew what we wanted. The configuration, however, is very complex.What's my experience with pricing, setup cost, and licensing?I think the pricing is OK. Be aware that you make rules about the use of identities, because otherwise you will pay!!!Which other solutions did I evaluate?We did not evaluate other options.What other advice do I have?Make sure that you have a good idea of what you want, because implementation is very complex. I am still amazed what this tool can do.Disclaimer: My company has a business relationship with this vendor other than being a customer:Our main company in Paris has relationship with vendor.
Date published: 2017-06-30T00:00:00-04:00
Rated 5 out of 5 by from Mobile application needs improvement but automatic on-boarding of new users is helpfulValuable Features:* Centralized access management/governance* Access Forms* Online Approval* Automatic on-boarding of new users and Termination of users that have left (i.e. Joiner, Mover, Leaver Process)* Business approach to access (Business Roles and descriptions)* User friendliness* Review - this is great for audit purposes, and proof of compliance.Improvements to My Organization:* Access Provisioning: the time-frame has been significantly reduced, as this was a paper based process previously.* All application access requests are completed from a centralised portal, whereas previously was also paper-based and confusing to users* Users and managers understand the different levels of technical functionality and can make risk-based decisions about granting access* Violations are highlighted almost real-time and can be managed much more effectively -and this reduces risk exposure of sensitive applicationsRoom for Improvement:The mobile application.Use of Solution:Four to five years.Deployment Issues:No issues with deployment.Stability Issues:In the older versions, there were sometimes instances where memory would get used up and the application would need a restart.Scalability Issues:No issues with scalability.Customer Service:Both with Aveksa, and now RSA our experience has been good.Previous Solutions:No previous solution used.Initial Setup:The people and change management process was quite complex, as we were changing our process and a major touch point to IT of the entire organisation.The complex nature of the enterprise environment in terms of different applications was quite complex, in that all technical access had to defined and thought of from a business functionality perspective.Implementation Team:We used a vendor team. They helped us through the technical side of things, and also got involved in business workshops and demonstrating the value and benefit of the solution to the organisation.Other Solutions Considered:Yes, we compared it to Oracle.Other Advice:Get business involved from the initial stages.Spend some time on user change management, communication and education.Adopt a maturity model of implementation - getting from a paper based access request governance process to a fully automated closed-loop verification one is a large change. It is possible to get small wins for a large number of applications in stages, For example:* Attain visibility into user access first across all applications* Initiate a clean-up of legacy access (this adds a lot of value and reduces potential risk exposure of multiple applications)* Define/workshop technical access and how it correlates to business functions for an application at a time* Implement business rules and violations* Initiate user and access reviews* Automate provisioning.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-01-29T00:00:00-05:00