RSA AVEKSA HW APP
Mfg.Part: AVK-PRODAPPLIANCE | CDW Part: 3227037
Lease Option ($966.59/month)
Note: Leasing is available to organizations only. Leasing is not available to individuals.
RSA AVEKSA HW APP
RSA AVEKSA HW APP is rated out of 5 by 3.
Rated 4 out of 5 by Amit Dewangan from Configuration based tool that requires less coding compared to other IAM products. Valuable FeaturesIt is a configuration based tool and requires less coding compared to other IAM products like SailPoint and OIM. It is very good in Access Governance for review processes.Improvements to My OrganizationBefore implementing RSA Aveksa, our organization was facing following challenges:* Manual provisioning and de-provisioning for users account like AD, Exchange, Lync and other applications. Due to manual innervation it will take time for user on-boarding process and also data is not sync if any changes happened in HR source.* Leaver account was not disabled on time. It leads to audit compliance issue.* Audit compliance issue.* Access Request management is not available.After implementing RSA Aveksa, all the above mentioned issues have been resolved.Room for Improvement* The Access Provisioning process needs to be improved. Compared to other IAM tool the architecture of provisioning process is not up to the mark.* Tutorial and solution examples are lacking in RSA community center.* Customization flexibility is also minimal due to this sometimes not able to fulfill the organization's complex requirements.Use of SolutionI have used this solution for last year and a half.Stability IssuesI did not encounter any stability issues.Customer Service and Technical SupportCustomer Service: RSA Customer care support is also good compared to other IAM products.Technical Support: I would give technical support a rating of 8/10.Previous SolutionsI wanted to learn and explore different IAM products. It would help me to achieve my career goal.Initial SetupThe initial setup was straightforward. The installation is easy and mostly all the required documents are available for the initial setup.Pricing, Setup Cost and LicensingI was not involved in pricing and licensing. But I believe compared to other IAM products, the license cost is less.Other Solutions ConsideredWe evaluated SailPoint Identity IQ and Novell Identity Manager.Other AdviceI would like to recommend this product. This product required very little customization and most of the solution can be developed using out of box features. For customers who have very complex requirements and require lots of customization, then I would recommend SailPoint Identity IQ.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-11-13
Rated 4 out of 5 by reviewer424647 from The most valuable features are the identity store and the membership rules. Valuable Features:The most valuable features are the identity store and the membership rules.Improvements to My Organization:HR is now our starting point. We have collectors to/from all back-end systems.We are able to see all the misconfigurations in HR/ backend-systems and we are able to correct them.Using membership rules saves us a lot of time. It is very important that we are in control.We are now able to assig roles based on HR attributes. Maintenance will be decreased.Room for Improvement:* AFX collector/connector for SAP* Forms: Should be more flexible to manage fields* You cannot show fancy documents to the end-userUse of Solution:We started to work with this tool two weeks ago after a long preparation time.Stability Issues:The stability is good, when you put in enough resources.Scalability Issues:When running big collections/connections for the first time, we encountered some performance issues. However, with additional resources, this was fixed.Technical Support:Our implementer is Capgemini and they are OK.Previous Solutions:We used AlertEnterprise. In the past, no identity module was purchased. We switched due to the high cost of implementation.Initial Setup:Because we were already working with the IAM tool, we already knew what we wanted. The configuration, however, is very complex.Cost and Licensing Advice:I think the pricing is OK. Be aware that you make rules about the use of identities, because otherwise you will pay!!!Other Solutions Considered:We did not evaluate other options.Other Advice:Make sure that you have a good idea what you want, because implementation is very complex. I am still amazed what this tool can do.Disclaimer: My company has a business relationship with this vendor other than being a customer:Our main company in Paris has relationship with vendor.
Date published: 2017-07-11
Rated 4 out of 5 by Bilal Essa from Mobile application needs improvement but automatic on-boarding of new users is helpful Valuable Features:* Centralized access management/governance* Access Forms* Online Approval* Automatic on-boarding of new users and Termination of users that have left (i.e. Joiner, Mover, Leaver Process)* Business approach to access (Business Roles and descriptions)* User friendliness* Review - this is great for audit purposes, and proof of compliance.Improvements to My Organization:* Access Provisioning: the time-frame has been significantly reduced, as this was a paper based process previously.* All application access requests are completed from a centralised portal, whereas previously was also paper-based and confusing to users* Users and managers understand the different levels of technical functionality and can make risk-based decisions about granting access* Violations are highlighted almost real-time and can be managed much more effectively -and this reduces risk exposure of sensitive applicationsRoom for Improvement:The mobile application.Use of Solution:Four to five years.Deployment Issues:No issues with deployment.Stability Issues:In the older versions, there were sometimes instances where memory would get used up and the application would need a restart.Scalability Issues:No issues with scalability.Customer Service:Both with Aveksa, and now RSA our experience has been good.Previous Solutions:No previous solution used.Initial Setup:The people and change management process was quite complex, as we were changing our process and a major touch point to IT of the entire organisation.The complex nature of the enterprise environment in terms of different applications was quite complex, in that all technical access had to defined and thought of from a business functionality perspective.Implementation Team:We used a vendor team. They helped us through the technical side of things, and also got involved in business workshops and demonstrating the value and benefit of the solution to the organisation.Other Solutions Considered:Yes, we compared it to Oracle.Other Advice:Get business involved from the initial stages.Spend some time on user change management, communication and education.Adopt a maturity model of implementation - getting from a paper based access request governance process to a fully automated closed-loop verification one is a large change. It is possible to get small wins for a large number of applications in stages, For example:* Attain visibility into user access first across all applications* Initiate a clean-up of legacy access (this adds a lot of value and reduces potential risk exposure of multiple applications)* Define/workshop technical access and how it correlates to business functions for an application at a time* Implement business rules and violations* Initiate user and access reviews* Automate provisioning.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-01-29