Hitachi ID Identity Manager

2.0
(1)


Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.

Work for Hitachi ID Identity Manager?

Learning about Hitachi ID Identity Manager?

We can help you find the solution that fits you best.

Hitachi ID Identity Manager Reviews

Ask Hitachi ID Identity Manager a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
For Category
Industry
Showing 1 Hitachi ID Identity Manager review
LinkedIn Connections
Hitachi ID Identity Manager review by Administrator in Oil & Energy
Administrator in Oil & Energy
Validated Reviewer
Review Source

"It works but it isn't pretty"

What do you like best?

It works as advertised for what we use it to do which primarily reset password

What do you dislike?

I think the user interface could be made to look much better and I found the administration of the product was overly complex and not well organized.

What business problems are you solving with the product? What benefits have you realized?

Password resets for multiple systems

Sign in to G2 Crowd to see what your connections have to say about Hitachi ID Identity Manager

What Privileged Access Management solution do you use?

Thanks for letting us know!

There are not enough reviews of Hitachi ID Identity Manager for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Centrify Application Services Logo
Centrify Application Services
4.4
(88)
Centrify Application Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s users as well as its privileged accounts.
2
Foxpass Logo
Foxpass
4.6
(28)
Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.
3
Oracle Identity Management Logo
Oracle Identity Management
3.9
(27)
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.
4
AWS Identity and Access Management (IAM) Logo
AWS Identity and Access Management (IAM)
4.4
(18)
AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
5
Centrify Infrastructure Services Logo
Centrify Infrastructure Services
4.5
(14)
Centrify Infrastructure Services is designed to help minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.
6
CyberArk Logo
CyberArk
4.1
(12)
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
7
ManageEngine ADManager Plus Logo
ManageEngine ADManager Plus
4.1
(11)
Active Directory Management and Reporting Solution
8
PingOne Logo
PingOne
3.8
(11)
PingOne® offers secure single sign-on for your employees from any device and gives IT one dashboard to manage user access for all applications.
9
IBM Cloud Identity Service Logo
IBM Cloud Identity Service
4.0
(10)
One service to take care of every identity and access management (IAM) need - that's what Cloud Identity Service will mean for your business. For a similar investment as shallow cloud-based IAM products, which only represent federated SSO and a few other IAM capabilities, Cloud Identity Service enables you to adopt cloud for your entire IAM system.
10
Silverfort.io Logo
Silverfort.io
4.8
(7)
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure.
Show more
Kate from G2 Crowd

Learning about Hitachi ID Identity Manager?

I can help.
* We monitor all Hitachi ID Identity Manager reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.