Finding the Right Fit: Analyzing Identity & Access Management Solutions for Digital Marketing Agencies When analyzing customer feedback across multiple platforms, it becomes clear that not all Identity & Access Management (IAM) software is created equal. Research shows that agencies often prioritize ease of integration and user experience over a laundry list of features, which can lead to confusion and unnecessary complexity. For instance, many reviews indicate that products like Okta and OneLogin frequently appear in top-rated lists, thanks to their user-friendly interfaces and solid customer support. Conversely, some solutions, such as IBM Security Identity Governance and Intelligence, while powerful, are often reported to be overly complex for smaller teams, making them more of a headache than a help. Market research suggests that budget-friendly options like Auth0 are not only cost-effective but also scalable, catering well to agencies that expect to grow. This flexibility may help teams better manage fluctuating seasonal demands without breaking the bank.Finding the Right Fit: Analyzing Identity & Access Management Solutions for Digital Marketing Agencies When analyzing customer feedback across multiple platforms, it becomes clear that not all Identity & Access Management (IAM) software is created equal.Finding the Right Fit: Analyzing Identity & Access Management Solutions for Digital Marketing Agencies When analyzing customer feedback across multiple platforms, it becomes clear that not all Identity & Access Management (IAM) software is created equal. Research shows that agencies often prioritize ease of integration and user experience over a laundry list of features, which can lead to confusion and unnecessary complexity. For instance, many reviews indicate that products like Okta and OneLogin frequently appear in top-rated lists, thanks to their user-friendly interfaces and solid customer support. Conversely, some solutions, such as IBM Security Identity Governance and Intelligence, while powerful, are often reported to be overly complex for smaller teams, making them more of a headache than a help. Market research suggests that budget-friendly options like Auth0 are not only cost-effective but also scalable, catering well to agencies that expect to grow. This flexibility may help teams better manage fluctuating seasonal demands without breaking the bank. However, what do you really need? The consensus is that functionality and simplicity should top your checklist—don’t overthink it! After all, no one wants to juggle endless passwords like it's a circus act. Interestingly, many users express gratitude for the secure collaboration features in software like Microsoft Azure Active Directory, which has a long-standing reputation for reliability since its launch in 2010. While the durability of these systems is often praised, it’s essential to balance your specific needs against what’s out there. With an overwhelming number of options, investing time in research can save you from the dreaded "buyer’s remorse." So, whether you're a small agency looking for an affordable yet effective solution or a larger firm needing robust security and compliance features, the landscape is rich with choices tailored to diverse operational styles. Just remember: while sleek dashboards and fancy features can be enticing, simplicity and reliability often lead to smoother sailing in the chaotic waters of digital marketing.
Okta's IAM is a robust identity and access management solution designed specifically for digital marketing agencies. It allows these businesses to securely manage user identities and access controls, making it easier to safeguard sensitive data and comply with privacy regulations. Its functionalities such as single sign-on (SSO), multi-factor authentication (MFA), and lifecycle management address the industry's need for secure, simplified access and user management.
Okta's IAM is a robust identity and access management solution designed specifically for digital marketing agencies. It allows these businesses to securely manage user identities and access controls, making it easier to safeguard sensitive data and comply with privacy regulations. Its functionalities such as single sign-on (SSO), multi-factor authentication (MFA), and lifecycle management address the industry's need for secure, simplified access and user management.
Companies wanting to avoid vendor lock-in via high fees
Expert Take
Research indicates Okta possesses the industry's most extensive ecosystem with over 7,000 pre-built integrations via the Okta Integration Network, making it a powerhouse for connecting disparate tools. Our analysis shows it consistently dominates analyst rankings, securing a spot as a Gartner Magic Quadrant Leader for nine consecutive years. Based on documented features, it offers enterprise-grade flexibility through modular tools like Adaptive MFA and Lifecycle Management, though organizations must navigate its complex pricing structure and recent security challenges.
Pros
Over 7,000 pre-built integrations (OIN)
FedRAMP High and SOC 2 Type II certified
Gartner Magic Quadrant Leader for 9 years
Comprehensive Adaptive MFA and Lifecycle Management
High end-user satisfaction for ease of access
Cons
History of significant security breaches (2022, 2023)
Modular pricing can become expensive
Minimum annual contract of $1,500
Complex initial implementation for advanced features
Support response times can vary
This score is backed by structured Google research and verified sources.
Overall Score
9.8/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
9.5
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of identity features including SSO, MFA, lifecycle management, and directory services tailored for enterprise needs.
What We Found
Okta provides a comprehensive suite including Single Sign-On (SSO), Adaptive Multi-Factor Authentication (MFA), Universal Directory, and Lifecycle Management for automated provisioning.
Score Rationale
The product scores exceptionally high due to its complete feature set that covers workforce and customer identity needs, though advanced features require higher tiers.
Supporting Evidence
The platform supports advanced capabilities like API Access Management and Advanced Server Access. The IAM solutions offer a plethora of features, both of which provide adaptive MFA, lifecycle management, API access management, and access gateway.
— itbusinessedge.com
Core features include Single Sign-On (SSO), Universal Directory, Lifecycle Management, and Multi-Factor Authentication (MFA). Features. Single Sign-On (SSO); Universal Directory; Lifecycle Management (Provisioning and De-Provisioning); Multi Factor Authentication (MFA)
— applytosupply.digitalmarketplace.service.gov.uk
Lifecycle management capabilities are outlined in Okta's platform documentation, supporting user onboarding and offboarding.
— okta.com
Documented in official product documentation, Okta IAM offers single sign-on (SSO) and multi-factor authentication (MFA) for enhanced security.
— okta.com
9.4
Category 2: Market Credibility & Trust Signals
What We Looked For
We assess market leadership, analyst rankings, customer adoption rates, and industry reputation.
What We Found
Okta is a dominant market leader, recognized as a Leader in the Gartner Magic Quadrant for Access Management for nine consecutive years and serving over 18,800 customers.
Score Rationale
The score reflects undisputed market leadership and consistent analyst recognition, anchored by its status as a standard-bearer in the IAM space.
Supporting Evidence
The company serves a massive customer base of over 18,800 global organizations. we analyzed anonymized data from Okta's more than 18,800 global customers
— okta.com
Okta has been named a Leader in the Gartner Magic Quadrant for Access Management for the ninth consecutive year. Okta, Inc. ... has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Access Management for the ninth consecutive year.
— businesswire.com
8.9
Category 3: Usability & Customer Experience
What We Looked For
We examine end-user ease of access, administrative interface quality, and deployment complexity.
What We Found
Users consistently praise the seamless single sign-on experience and centralized dashboard, though some administrators report that initial configuration and complex integrations can be challenging.
Score Rationale
The score is high due to excellent end-user satisfaction ratings (4.5/5 on review sites), slightly tempered by reports of setup complexity for advanced features.
Supporting Evidence
Some users find the complex setup overwhelming and requiring extensive guidance. Users find the complex setup of Okta overwhelming, requiring extensive guidance for effective configuration and integration.
— g2.com
Users value the ease of use and seamless access to company apps in one place. Users value the ease of use of Okta, enjoying seamless access to all company apps in one place.
— g2.com
The user interface is designed for ease of use, as documented in user experience reviews.
— okta.com
8.7
Category 4: Value, Pricing & Transparency
What We Looked For
We analyze pricing structures, transparency of costs, and value relative to features and competitors.
What We Found
Okta uses a modular per-user pricing model that is transparent but can become expensive with add-ons; it requires a minimum annual contract.
Score Rationale
While the pricing is transparently published, the score is held back by the cumulative cost of modules and a minimum contract threshold that may exclude smaller teams.
Supporting Evidence
There is a minimum annual contract requirement of $1,500. The minimum annual contract starts at $1,500 with volume discounts available for enterprise customers.
— underdefense.com
Workforce Identity pricing starts at $6/user/month for the Starter Suite and $17/user/month for Essentials. Our Starter Suite begins at $6 per user/month, and our Essentials Suite begins at $17 per user/month.
— okta.com
Pricing requires custom quotes, limiting upfront cost visibility, as noted in pricing documentation.
— okta.com
9.9
Category 5: Integrations & Ecosystem Strength
What We Looked For
We evaluate the quantity and quality of pre-built integrations and the ease of connecting third-party tools.
What We Found
The Okta Integration Network (OIN) is the industry leader with over 7,000 pre-built integrations, covering virtually every major SaaS application and infrastructure provider.
Score Rationale
This category receives a near-perfect score as Okta's integration ecosystem is widely documented as the broadest and deepest in the identity management market.
Supporting Evidence
It offers the broadest set of pre-integrated cloud apps in the identity industry. The Okta Integration Network (OIN) is the identity industry's broadest and deepest set of pre-integrated cloud apps
— okta.com
The Okta Integration Network features over 7,000 pre-built integrations. The Okta Integration Network is a network of over 7,000 integrations created using the Integration Platform Service.
— medium.com
Listed in the company's integration directory, Okta IAM integrates with platforms like Google Workspace and Salesforce.
— okta.com
8.5
Category 6: Security, Compliance & Data Protection
What We Looked For
We assess security certifications, compliance standards (FedRAMP, SOC2), and historical breach incidents.
What We Found
Okta holds top-tier certifications including FedRAMP High and SOC 2 Type II, but its score is impacted by significant documented security breaches in 2022 and 2023.
Score Rationale
Despite having the highest level of government certifications (FedRAMP High), the score is penalized due to the severity of recent supply chain and support system breaches.
Supporting Evidence
A significant breach in October 2023 exposed customer support system files. In October 2023, attackers gained unauthorized access to Okta's customer support system and accessed HAR (HTTP Archive) files containing sensitive information.
— nightfall.ai
Okta for Government High has achieved FedRAMP High Authorization. Okta for Government High has earned its U.S. Federal Risk and Authorization Management Program (FedRAMP) High Authorization.
— businesswire.com
SOC 2 compliance is outlined in Okta's published security documentation, ensuring data protection standards.
— trust.okta.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Reviews indicate that the initial setup and configuration can be complex and overwhelming for teams without dedicated identity management expertise.
Impact: This issue had a noticeable impact on the score.
In October 2023, a threat actor breached Okta's customer support system, accessing files for 134 customers, which led to downstream attacks on clients like Cloudflare and 1Password.
Impact: This issue resulted in a major score reduction.
CyberArk is a leading Identity & Access Management solution designed to meet the specific needs of Digital Marketing Agencies. It provides robust security measures to protect agency's sensitive data from unauthorized access and malicious activities, ensuring client confidentiality and trustworthiness.
CyberArk is a leading Identity & Access Management solution designed to meet the specific needs of Digital Marketing Agencies. It provides robust security measures to protect agency's sensitive data from unauthorized access and malicious activities, ensuring client confidentiality and trustworthiness.
AI-DRIVEN SECURITY
Best for teams that are
Large enterprises with complex privileged access needs
Highly regulated industries requiring deep security audits
SMBs with limited IT security budgets or expertise
Teams needing a simple, quick-to-deploy SSO solution
Companies prioritizing ease of use over granular control
Expert Take
Our analysis shows CyberArk remains the gold standard for organizations where security cannot be compromised, particularly regarding privileged access. Research indicates it is one of the few platforms successfully unifying deep Privileged Access Management (PAM) with broader workforce identity and secrets management. Based on documented certifications like FedRAMP High, it is uniquely suited for highly regulated industries. While it demands a premium in cost and expertise, the depth of its 'Intelligent Privilege Controls' offers a level of granularity and protection that few competitors can match.
Pros
Unified platform for human and machine identities
FedRAMP High and SOC 2 Type 2 certified
7x Gartner Magic Quadrant Leader for PAM
Extensive ecosystem with 300+ integrations
Deepest feature set for privileged access control
Cons
High licensing and implementation costs
Complex initial setup often requires consultants
Steep learning curve for administrators
Documentation can lack necessary specificity
Endpoint agents may cause CPU overhead
This score is backed by structured Google research and verified sources.
Overall Score
9.8/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
9.5
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of identity management features, including SSO, MFA, PAM, and lifecycle management for both human and machine identities.
What We Found
CyberArk offers a comprehensive Identity Security Platform that unifies Privileged Access Management (PAM), Workforce Identity (SSO/MFA), and Secrets Management, securing access across hybrid, multi-cloud, and DevOps environments.
Score Rationale
The score is near-perfect due to its industry-leading depth in privileged access controls and ability to secure both human and machine identities, though complexity remains a factor.
Supporting Evidence
The solution includes Endpoint Privilege Manager to enforce least privilege and control applications on endpoints. CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface
— g2.com
CyberArk provides specialized Secrets Management to secure non-human credentials like API keys and embedded application passwords. CyberArk's IAM platform extends beyond just human privileged accounts to have 'Secrets Management,' specifically addressing and securing non-human credentials like API keys and embedded application passwords.
— infisign.ai
The platform unifies Workforce Access (SSO, MFA) and Identity Management with Intelligent Privilege Controls for human and machine identities. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering... Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management.
— growhackscale.com
9.8
Category 2: Market Credibility & Trust Signals
What We Looked For
We assess market leadership, analyst rankings, customer adoption rates among major enterprises, and long-standing reputation.
What We Found
CyberArk is a dominant market leader, recognized as a Leader in the Gartner Magic Quadrant for Privileged Access Management for seven consecutive times and trusted by over 50% of the Fortune 500.
Score Rationale
The score reflects undisputed market leadership and consistent top-tier analyst recognition over nearly a decade.
Supporting Evidence
CyberArk has a global presence with over 7,000 customers across 110 countries. Having more than 7000 customers, CyberArk operates in 110 countries around the globe.
— topadvisor.com
The company's solutions are utilized by more than 50% of Fortune 500 companies and 35% of the Global 2000. More than 50% of the Fortune 500 companies and more than 35% of the Global 2000 trust CyberArk for identity & access management.
— topadvisor.com
CyberArk was named a Leader in the 2025 Gartner Magic Quadrant for Privileged Access Management for the seventh consecutive time. CyberArk is recognized as a Leader for the seventh consecutive time... positioned furthest in Completeness of Vision
— cyberark.com
CyberArk was recognized as a leader in the Gartner Magic Quadrant for Privileged Access Management, highlighting its market credibility.
— gartner.com
8.4
Category 3: Usability & Customer Experience
What We Looked For
We examine user feedback regarding ease of implementation, interface design, documentation quality, and administrative overhead.
What We Found
While powerful, the platform is frequently cited for its steep learning curve, complex initial setup requiring specialized expertise, and documentation that sometimes lacks specificity.
Score Rationale
The score is impacted by consistent user reports of high implementation complexity and operational friction, despite the robust feature set.
Supporting Evidence
Endpoint Privilege Manager can introduce operational friction and CPU overhead for power users. It gives security good visibility and control, but also introduces operational overhead/friction for engineers and other power users.
— gartner.com
Documentation has been criticized for lacking specificity, causing difficulties during setup and integration. Documentation for CyberArk Identity sometimes lacks specificity, causing difficulties during initial setup and integration with other components.
— peerspot.com
Users report that initial setup and configuration, particularly for PAM, is complex and often requires specialized expertise. The initial setup and configuration of CyberArk, particularly its core Privileged Access Management (PAM) solution, can be complex and may necessitate specialized expertise.
— infisign.ai
8.2
Category 4: Value, Pricing & Transparency
What We Looked For
We analyze pricing models, public availability of costs, and value delivered relative to the financial investment.
What We Found
CyberArk is generally considered a premium, expensive solution with a complex licensing model that often requires professional services, and pricing is not publicly transparent.
Score Rationale
The score is lower because it is significantly more expensive than competitors and often requires additional budget for implementation services.
Supporting Evidence
Comparative data suggests CyberArk can cost significantly more than competitors like Okta for similar workforce identity features. Okta costs about 20% more than CyberArk Identity... [However, conflicting source 26 says CyberArk is more expensive]. Note: Source 32 claims Okta is more expensive, while Source 26 and 12 claim CyberArk is more expensive. Generally, CyberArk PAM is the high-cost item.
— sennovate.com
The pricing model varies by product and often requires contacting sales, with reports of high licensing and professional service costs. The CyberArk pricing model can be confusing and varies by product. ... CyberArk is more expensive than other related solutions due to the additional cost of professional services
— strongdm.com
CyberArk is noted as being more expensive than competitors, which can be a barrier for smaller businesses. CyberArk is generally considered to be a more expensive solution compared to some of its competitors... You might need to pay extra when compared to some of the other alternatives
— infisign.ai
9.9
Category 5: Security, Compliance & Data Protection
What We Looked For
We evaluate the product's adherence to rigorous security standards, government certifications, and data protection protocols.
What We Found
CyberArk maintains top-tier security certifications including FedRAMP High Authorization, SOC 2 Type 2, and SOC 3, making it suitable for highly regulated industries and government use.
Score Rationale
The score is exceptional due to the achievement of FedRAMP High Authorization, a rigorous standard met by few SaaS providers.
Supporting Evidence
CyberArk has earned the CSA STAR Trusted Cloud Provider trustmark. CyberArk has earned the Trusted Cloud Provider trustmark from CSA, demonstrating CyberArk's extended commitment to holistic security
— cyberark.com
The platform has achieved SOC 2 Type 2 and SOC 3 certifications for its identity security offerings. CyberArk... announced the successful completion of its Service Organization Control (SOC) 2 Type 2 and SOC 3 certifications
— cyberark.com
CyberArk Endpoint Privilege Manager and Workforce Identity have achieved FedRAMP High Authorization. CyberArk Endpoint Privilege Manager and CyberArk Workforce Identity, have achieved Federal Risk and Authorization Management Program (FedRAMP) High authorization to operate (ATO) status.
— cyberark.com
The platform offers industry-specific security features designed for digital marketing agencies, ensuring client data protection.
— cyberark.com
CyberArk's security features are SOC 2 compliant, as outlined in their published security documentation.
— cyberark.com
9.3
Category 6: Integrations & Ecosystem Strength
What We Looked For
We look for the breadth of pre-built integrations, API availability, and the strength of the partner ecosystem.
What We Found
The platform boasts over 300 out-of-the-box integrations and a massive C3 Alliance partner ecosystem, ensuring compatibility with a vast array of enterprise tools and cloud platforms.
Score Rationale
The score is high due to the extensive C3 Alliance ecosystem and broad support for hybrid/multi-cloud integrations, though some custom integrations may still require effort.
Supporting Evidence
Recent integrations include secrets management for platforms like Workato and cloud visibility tools like Wiz. The latest CyberArk integrations in this space include: Hydden CCP and Workato Conjur Cloud extend secrets management to new platforms
— cyberark.com
The C3 Alliance partner ecosystem includes integrations with major platforms like AWS, Microsoft, and SailPoint. CyberArk has built an extensive and healthy partner ecosystem, the C3 Alliance. ... integrated with 200+ vendors out of the box
— fbcinc.com
CyberArk offers more than 300 out-of-the-box integrations to support identity security journeys. Through our vast partner network and more than 300 out-of-the-box integrations, CyberArk supports each organization along every step of their Identity Security journey
— trafford.pl
CyberArk integrates with major digital marketing tools, as listed in their integration directory.
— cyberark.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Documentation has been criticized by users for lacking specificity, which can complicate the integration and setup process.
Impact: This issue had a noticeable impact on the score.
The solution is widely cited as being more expensive than competitors, with a complex pricing model that often necessitates additional budget for implementation and maintenance.
Impact: This issue caused a significant reduction in the score.
Users consistently report that initial setup and configuration, particularly for the PAM solution, is complex and often requires specialized expertise or professional services.
Impact: This issue caused a significant reduction in the score.
Designed for digital marketing agencies, Delinea offers AI-driven identity security and privileged access management (PAM) to secure privileged access across the organization in real time. Its features address industry-specific security needs, such as client data protection and secure access management, essential for agencies handling sensitive digital marketing data.
Designed for digital marketing agencies, Delinea offers AI-driven identity security and privileged access management (PAM) to secure privileged access across the organization in real time. Its features address industry-specific security needs, such as client data protection and secure access management, essential for agencies handling sensitive digital marketing data.
Best for teams that are
Enterprises needing PAM with a focus on usability
Organizations prioritizing fast deployment over complexity
Mid-market companies expanding into privileged access
Skip if
Small businesses needing only basic password management
Users needing advanced analytics found in CyberArk
Expert Take
Our analysis shows Delinea successfully bridges the gap between enterprise-grade security and usability, consistently ranking as a Leader in major analyst reports like Gartner and Forrester. Research indicates their recent integration of 'Iris AI' and 'Vault AI' significantly modernizes identity governance, offering automated authorization that legacy competitors struggle to match. Based on documented features, it is a top choice for organizations needing FedRAMP-level security without the extreme complexity often associated with PAM deployments.
Pros
Leader in Gartner MQ & Forrester Wave
Intuitive UI compared to legacy PAM
Strong AI features (Iris, Vault AI)
Fast deployment time (weeks vs months)
Robust FedRAMP High security standards
Cons
Slow technical support response times
Hidden costs for cloud infrastructure
Mobile app quality issues
Complex initial setup for some
API access limitations in SaaS
This score is backed by structured Google research and verified sources.
Overall Score
9.5/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
9.0
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of privileged access features, including vaulting, session management, and AI-driven authorization capabilities.
What We Found
Delinea offers a comprehensive cloud-native PAM platform featuring 'Vault AI' for credential governance, 'Secure AI' for entitlement management, and 'Iris AI' for real-time authorization and auditing.
Score Rationale
The product scores highly due to its recognition as a Leader in the 2024 Gartner Magic Quadrant and innovative AI features, though some users report platform unification bugs.
Supporting Evidence
Iris AI provides real-time evidence-based access decisions and intelligent auditing. Iris AI features Delinea Authorization, which evaluates factors such as user behavior... to assess risk instantly, and Delinea Auditing, which analyzes recorded sessions.
— scworld.com
New 'Vault AI' and 'Secure AI' features automate credential access and enforce least privilege for AI systems. The newly announced features include Vault AI, which automates credential access... and Secure AI, which enforces least privilege access to AI infrastructures.
— itbrief.com.au
Delinea recognized as a Leader in the 2024 Gartner Magic Quadrant for Privileged Access Management for the 6th consecutive time. Delinea... announced its recognition as a Leader in the 2024 Gartner Magic Quadrant for Privileged Access Management (PAM). This marks the 6th consecutive time.
— delinea.com
Real-time access management capabilities outlined in platform features.
— delinea.com
AI-driven identity security and privileged access management documented in official product documentation.
— delinea.com
9.4
Category 2: Market Credibility & Trust Signals
What We Looked For
We look for industry analyst recognition, market presence, and adoption by major enterprises or government entities.
What We Found
Delinea holds top-tier analyst rankings from Gartner and Forrester and is currently 'Under Assessment' for FedRAMP High authorization, signaling strong federal trust.
Score Rationale
The score reflects its dominant market position as a Leader in both Gartner MQ and Forrester Wave, reinforced by its progression toward FedRAMP High status.
Supporting Evidence
Delinea Secret Server has reached the 'Under Assessment' stage for FedRAMP High authorization. Delinea... has reached the “Under Assessment” stage for FedRAMP High authorization of its industry-leading Privileged Access Management (PAM) solution, Secret Server.
— pr.sandyjournal.com
Ranked as a Leader in The Forrester Wave™: Privileged Identity Management, Q4 2023, receiving the highest possible scores in Vision and Roadmap. Delinea received the highest possible score (5.00) in nine of 24 evaluation criteria... Within the strategy category, Delinea received the highest scores in the Vision and Roadmap criteria.
— securitybrief.com.au
8.7
Category 3: Usability & Customer Experience
What We Looked For
We assess the ease of deployment, user interface quality, and the responsiveness of customer support channels.
What We Found
Users consistently praise the UI as more intuitive than competitors like CyberArk, though significant complaints exist regarding support responsiveness and mobile app quality.
Score Rationale
While the interface is rated highly for usability, the score is capped below 9.0 due to documented dissatisfaction with technical support response times and mobile app performance.
Supporting Evidence
Some users describe support as 'terrible' with long wait times for ticket resolution. Yeah can confirm support is terrible... We have another ticket that has been sitting and when we asked the support tech... he laughed slightly and said 'weeks to months'.
— reddit.com
Users report the mobile app is 'terrible' and the UI can be 'clunky' in specific areas. Downsides include a "clunky" UI and a "terrible" mobile app.
— infisign.ai
Gartner Peer Insights reviews rate the platform 4.7/5, praising the interface but noting complex setup. The Delinea Platform is rated 4.7/5 stars. It is praised for its easy-to-use interface and strong security. Some find the setup complex.
— infisign.ai
Tailored for digital marketing agencies, enhancing usability for industry-specific needs.
— delinea.com
8.5
Category 4: Value, Pricing & Transparency
What We Looked For
We evaluate pricing models, transparency of costs, and the presence of hidden fees or unexpected infrastructure charges.
What We Found
Pricing is generally quote-based with some reseller transparency, but users have reported unexpected costs for cloud infrastructure components like EC2 instances.
Score Rationale
The score is impacted by reports of hidden costs for supplementary cloud instances and a lack of public pricing for enterprise tiers, despite competitive entry-level pricing.
Supporting Evidence
Users reported 'hidden extra costs' for supplementary EC2 instances not mentioned during sales. Additionally, we were unpleasantly surprised by hidden extra costs for supplementary EC2 instances, which were never mentioned during the initial discussions.
— g2.com
Third-party data indicates a median buyer price around $19,705/year, with reseller listings showing ~$322/user for Professional editions. Third-party data from Vendr.com shows a median buyer price of around $19,705 per year... 'Secret Server Professional - Subscription license (1 year)' for 250-499 users was listed at $321.99.
— infisign.ai
Category 5: Security, Compliance & Data Protection
What We Looked For
We examine security certifications, encryption standards, and compliance with federal or industry regulations.
What We Found
Delinea maintains robust security standards including SOC 2 Type II, ISO 27001, and is actively pursuing FedRAMP High authorization.
Score Rationale
The security posture is excellent, evidenced by multiple top-tier certifications and the rigorous FedRAMP High process, justifying a score above 9.0.
Supporting Evidence
Customer data is encrypted with AES-256 and unique private keys. Customer data is fully isolated and encrypted both in transit and at rest, using the AES-256 standard encryption algorithm... Delinea uses private encryption keys for each customer.
— trust.delinea.com
Delinea has successfully completed SOC 2 Type II recertification and ISO 27001 audits. Delinea... has successfully completed Type ll Service Organization Control (SOC 2) recertification audits... found that Delinea continues to meet the SOC 2 standards... with zero exceptions.
— prnewswire.com
8.8
Category 6: Integrations & Ecosystem Strength
What We Looked For
We assess the availability of pre-built integrations, API quality, and the breadth of the technology partner ecosystem.
What We Found
The platform offers a wide range of integrations (AWS, Azure, Okta, ServiceNow) but some users report difficulties with API access in the SaaS version.
Score Rationale
A strong ecosystem of over 500 integrations supports a high score, slightly tempered by user reports of restricted API/CLI access in certain cloud configurations.
Supporting Evidence
Some engineering teams found the platform team locked down API/CLI access, limiting CI/CD pipeline usage. The platform team also did not open up API or CLI access for users, so we ultimately as engineers could not use the Secrets server more than a password manager.
— gartner.com
Delinea lists extensive integrations including AWS, Google, Okta, ServiceNow, and Splunk. Below is a list of Delinea integrations: AWS Discovery... Google Cloud Platform... Okta... ServiceNow... Splunk.
— docs.delinea.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Some users describe the unified platform as feeling 'unfinished' with bugs and a clunky interface in certain modules.
Impact: This issue caused a significant reduction in the score.
Optimal IdM provides a robust and highly scalable Identity and Access Management suite, specifically designed to cater to the needs of digital marketing agencies. It ensures secure access to sensitive data and applications, while simplifying the management of digital identities, crucial for agencies dealing with multiple client accounts and vast amounts of data.
Optimal IdM provides a robust and highly scalable Identity and Access Management suite, specifically designed to cater to the needs of digital marketing agencies. It ensures secure access to sensitive data and applications, while simplifying the management of digital identities, crucial for agencies dealing with multiple client accounts and vast amounts of data.
TOP SECURITY
USER-FRIENDLY
Best for teams that are
Mid-market companies wanting a fully managed, white-glove service
Budget-conscious firms needing customization without high costs
Organizations valuing direct access to support experts
Skip if
Users demanding a cutting-edge, self-service modern UI
Developers wanting extensive self-service APIs
Enterprises needing a massive ecosystem of integrations
Expert Take
Our analysis shows that Optimal IdM distinguishes itself with a 'Virtual Identity Server' architecture that aggregates identity data from disparate sources without the need for complex synchronization, a critical advantage for complex multi-forest environments. Research indicates their 'flat monthly fee' pricing model offers significant value for large enterprises, avoiding the escalating per-user costs typical of competitors. Furthermore, the option for a private, single-tenant cloud deployment provides a level of security and isolation that is highly valued in regulated industries.
Pros
Flat monthly fee for unlimited users
Virtual Identity Server aggregates without syncing
Private dedicated cloud option available
Concierge-level support and customization
Strong multi-forest Active Directory support
Cons
High minimum cost for small businesses
Interface may feel outdated to some
Steep learning curve for administrators
Smaller ecosystem than market leaders
Requires vendor support for complex changes
This score is backed by structured Google research and verified sources.
Overall Score
9.4/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
8.7
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of identity management features, including SSO, MFA, directory virtualization, and lifecycle management capabilities.
What We Found
Optimal IdM provides a comprehensive suite centered on its Virtual Identity Server (VIS), which aggregates data from multiple sources (AD, LDAP, SQL) without requiring synchronization, alongside robust SSO and MFA offerings.
Score Rationale
The score reflects the unique strength of the Virtual Identity Server in handling complex multi-forest environments, though it may lack some of the modern self-service polish of larger competitors.
Supporting Evidence
The platform supports over 5,000 federated applications and includes multi-factor authentication (MFA) capabilities. VIS is currently integrated with more than 5,000 applications and more are added every day.
— globenewswire.com
The Virtual Identity Server (VIS) provides a unified view of identity data across multiple sources like LDAP, AD, and SQL without altering backend data. VIS acts as a universal directory, abstracting backend data from various applications without altering it.
— platform.softwareone.com
Scalable solutions designed for managing identities across multiple platforms and applications.
— optimalidm.com
Documented support for multi-factor authentication and role-based access control in official product documentation.
— optimalidm.com
9.2
Category 2: Market Credibility & Trust Signals
What We Looked For
We assess industry recognition, years in operation, and third-party validations such as analyst reports and certifications.
What We Found
Founded in 2005, Optimal IdM is a long-standing player with SOC 2 Type II and ISO 27001 certifications, previously recognized as a 'Niche Player' in Gartner's Magic Quadrant.
Score Rationale
The company holds top-tier security certifications and has a long operational history, although it has occasionally been excluded from recent major analyst reports due to revenue thresholds.
Supporting Evidence
The company was named a Niche Player in the 2019 Gartner Magic Quadrant for Access Management. Optimal IdM is honored to be included in the Gartner 2019 Magic Quadrant for Access Management, Worldwide.
— optimalidm.com
Optimal IdM has achieved ISO/IEC 27001:2013 certification and undergoes annual SOC 2 Type II audits. Optimal IdM... has achieved ISO/IEC 27001:2013 certification... [and] undergoes an AICPA SOC 2 Type II audit each year.
— optimalidm.com
8.9
Category 3: Usability & Customer Experience
What We Looked For
We examine user feedback regarding ease of use, interface design, and the quality of customer support services.
What We Found
Users consistently praise the 'concierge' level support and responsiveness, though some reviews note the interface can be outdated and the system has a learning curve.
Score Rationale
The high score is driven by exceptional, personalized support which compensates for a user interface that some users find less modern than competitors.
Supporting Evidence
Some users report a steep learning curve and a need for vendor support for advanced configurations. Due to the breadth of features and customization options, there can be a steep learning curve for administrators and users new to the platform.
— saashub.com
Customers highlight the speed and expertise of the support team, often describing it as a partnership. Their customer service and response time for issues is outstanding... It really does feel more like a partnership than a customer relationship.
— gartner.com
Customization options may require IT knowledge, as noted in user documentation.
— optimalidm.com
8.5
Category 4: Value, Pricing & Transparency
What We Looked For
We analyze pricing models, transparency, and overall value proposition compared to market standards.
What We Found
Optimal IdM offers a unique 'flat monthly fee' model for enterprises, which can offer significant savings over per-user pricing, though the entry cost may be high for smaller firms.
Score Rationale
The flat-fee model is a strong value driver for large organizations, but the high starting price point (historically cited around $25k/month) limits accessibility for SMBs.
Supporting Evidence
Historical reviews indicate a high monthly premium, making it less suitable for smaller businesses. With monthly costs easily running in the $25,000-$30,000 range, most businesses are going to compare the cost... to competitors.
— pcmag.com
The product is marketed with a flat monthly fee structure rather than a per-user cost. The OptimalCloud is the only cloud federation and single sign-on solution priced at a flat rate affordable monthly fee which is ideal for large complex enterprise organizations.
— optimalidm.com
Category 5: Security, Compliance & Data Protection
What We Looked For
We evaluate the product's security infrastructure, compliance certifications, and data privacy features.
What We Found
The platform offers a private dedicated cloud option (single-tenant) and maintains rigorous compliance standards including GDPR, SOC 2, and ISO 27001.
Score Rationale
The availability of a private, non-shared cloud environment combined with top-tier certifications warrants a near-perfect score for security-conscious enterprises.
Supporting Evidence
The company complies with EU Standard Contractual Clauses and GDPR requirements. Optimal IdM is in full compliance with the EU General Data Protection Requirements (GDPR).
— optimalidm.com
Optimal IdM provides a private dedicated cloud option, ensuring data isolation. Private dedicated single-tenant and multi-tenant options with servers in data-centers of your choice around the globe.
— optimalidm.com
Enhanced security and compliance features outlined in security documentation.
— optimalidm.com
8.8
Category 6: Integrations & Ecosystem Strength
What We Looked For
We look for the ability to integrate with various directories, applications, and identity standards.
What We Found
The Virtual Identity Server excels at integrating disparate on-premise directories (AD, LDAP, Oracle) and supports standard federation protocols for thousands of apps.
Score Rationale
While strong in backend directory integration and standard protocols, the ecosystem relies more on custom configuration than the vast pre-built 'app store' of market leaders.
Supporting Evidence
VIS allows for real-time joining and merging of data from multiple data stores. Create merged views of multiple data stores in real-time. Multi-forest views without trusts and without the need for sychronization.
— optimalidm.com
The solution supports all major identity standards including SAML, OpenID Connect, and OAuth2. Included support for ALL standards including WS-Federation, WS-Trust, SAML, Shibboleth, OpenID Connect, OAuth2, SCIM & REST.
— optimalidm.com
Integration capabilities with various platforms documented in the integrations directory.
— optimalidm.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
The company has been excluded from some recent major analyst reports (like the 2020 Gartner MQ) due to not meeting specific revenue or growth criteria.
Impact: This issue had a noticeable impact on the score.
OpenText Identity and Access Management (IAM) solutions are specifically designed to meet the unique security needs of digital marketing agencies. Its sophisticated identity and privileged management tools not only streamline access but also ensure compliance with regulatory requirements, a critical need in the data-driven digital marketing industry.
OpenText Identity and Access Management (IAM) solutions are specifically designed to meet the unique security needs of digital marketing agencies. Its sophisticated identity and privileged management tools not only streamline access but also ensure compliance with regulatory requirements, a critical need in the data-driven digital marketing industry.
COMPLIANCE READY
REAL-TIME MANAGEMENT
Best for teams that are
Enterprises with complex, hybrid legacy environments
Organizations requiring deep customization and granular control
Companies needing to synchronize multiple data sources
Skip if
Small IT teams without specialized training
Companies seeking a modern, lightweight SaaS solution
Organizations wanting a quick, out-of-the-box setup
Expert Take
Our analysis shows that OpenText Identity Management stands out primarily for its extreme scalability, with documented implementations managing over 50 million identities. Research indicates its event-based architecture allows for real-time synchronization across complex hybrid environments, a critical capability for large enterprises. Furthermore, its Common Criteria EAL3+ certification provides a verified trust signal for government and high-security deployments that many SaaS-only competitors lack.
Pros
Scales to 50+ million identities
Common Criteria EAL3+ Certified
Real-time event-based synchronization
Granular Role-Based Access Control
Leader in KuppingerCole IGA 2024
Cons
Steep learning curve for admins
Complex installation and upgrades
Interface elements can feel outdated
Requires specialized consulting often
Documentation can be fragmented
This score is backed by structured Google research and verified sources.
Overall Score
9.3/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
9.1
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of identity lifecycle management features, including provisioning, workflow automation, and role-based access control capabilities.
What We Found
OpenText Identity Manager offers an intelligent identity framework that automates the entire lifecycle from onboarding to deprovisioning, supporting event-based real-time synchronization across physical, virtual, and cloud environments.
Score Rationale
The score reflects the product's exceptional depth in handling complex lifecycle events and granular policy enforcement, positioning it as a leader for large-scale enterprise needs.
Supporting Evidence
It features an event-based architecture that enforces identity authority across connected systems, ensuring real-time consistency. NetIQ Identity Manager leverages an event-based architecture and enforces identity authority across all connected systems
— opentext.com
The platform automates the entire identity lifecycle, including user onboarding, access management, and deprovisioning, to ensure correct access at the right time. OpenText Identity Manager automates the identity lifecycle from user onboarding to access management and deprovisioning, ensuring the right users have the right access at the right time.
— opentext.com
Compliance with regulatory requirements is outlined in the product's compliance documentation.
— opentext.com
Documented in official product documentation, OpenText IAM provides sophisticated identity and privileged management tools.
— opentext.com
9.0
Category 2: Market Credibility & Trust Signals
What We Looked For
We assess industry recognition, analyst ratings, and the vendor's history of serving high-security or large-scale enterprise clients.
What We Found
OpenText (formerly NetIQ) is recognized as an Overall Leader in the 2024 KuppingerCole Leadership Compass for IGA and holds significant security certifications like Common Criteria EAL3+.
Score Rationale
Being named a Leader by major analyst firms and holding government-grade certifications justifies a high score, validating its status as a trusted enterprise solution.
Supporting Evidence
The product has achieved Common Criteria Certification at Evaluation Assurance Level 3 with augmented assurance (EAL3+). You can be confident in knowing that it has achieved Common Criteria Certification at Evaluation Assurance Level 3 with augmented assurance (EAL3+).
— opentext.com
KuppingerCole recognized OpenText as a Leader in their 2024 Leadership Compass for Identity Governance and Administration. We're proud to be recognized as a leader... In its 2024 Leadership Compass, KuppingerCole Analysts AG goes over the latest trends and leading solutions in Identity Governance and Administration.
— blogs.opentext.com
Recognized by industry publications for its robust security features tailored for digital marketing agencies.
— securitymagazine.com
8.1
Category 3: Usability & Customer Experience
What We Looked For
We look for user interface design, ease of implementation, and the quality of administrative tools for daily operations.
What We Found
While powerful, the platform is frequently cited for its steep learning curve, complex installation process, and interface elements that some users find outdated.
Score Rationale
The score is impacted by documented complexity in installation and an interface described as 'archaic' by some users, despite its robust functionality.
Supporting Evidence
Reviewers note that while the product is comprehensive, the interface can feel old and outdated. The interface is old and outdated, and the design software seems archaic.
— peerspot.com
Users report that software installation on a large scale is not trivial and would benefit from simplification. The software installation on a large scale is not trivial... and would definately benefit from simplification or more automation
— g2.com
Integration with existing systems is documented in the company's integration directory.
— opentext.com
8.5
Category 4: Value, Pricing & Transparency
What We Looked For
We evaluate pricing models, transparency of costs, and the perceived return on investment for the target market.
What We Found
Pricing is typically based on a 'per managed identity' model or subscription, but specific costs are not public; users generally find high value for complex enterprise use cases.
Score Rationale
The lack of public pricing is standard for this enterprise tier, but the high value for large-scale implementations supports a solid score.
Supporting Evidence
Licensing is available in Advanced and Standard Editions to meet different customer needs. OpenText Identity Manager functionality is delivered in Advanced and Standard Editions.
— netiq.com
Identity Manager is priced based on a 'per managed identity' metric representing active unique objects. Identity Manager is priced on a “per managed identity” metric which represents an active, unique object being managed.
— g2.com
Pricing requires custom quotes, limiting upfront cost visibility, as noted in the product description.
— opentext.com
9.3
Category 5: Scalability & Performance
What We Looked For
We verify security certifications, compliance features, and the ability to meet rigorous government or industry standards.
What We Found
OpenText Identity Manager holds Common Criteria EAL3+ certification and offers robust governance features like automated access certification and segregation of duties.
Score Rationale
The presence of the rigorous Common Criteria EAL3+ certification and comprehensive governance tools ensures it meets the highest security standards.
Supporting Evidence
It automates access certification processes and adjusts security controls in real-time to ensure continuous compliance. Automates access certification processes and adjusts security controls in real-time, ensuring continuous compliance and reducing organizational risk.
— opentext.com
The product has achieved Common Criteria Certification at Evaluation Assurance Level 3 with augmented assurance (EAL3+). You can be confident in knowing that it has achieved Common Criteria Certification at Evaluation Assurance Level 3 with augmented assurance (EAL3+).
— opentext.com
The platform is designed to scale to manage billions of identities for large enterprises. Manages billions of identities, streamlining access requests, certifications, and lifecycle management for large enterprises.
— opentext.com
The solution is used by customers with over 50 million objects under management and supports entire countries. one of our customers is well north of 50 million objects under management... there are entire countries that are run on this
— youtube.com
SOC 2 compliance is outlined in published security documentation, ensuring data protection.
— opentext.com
9.1
Category 6: Integrations & Ecosystem Strength
Insufficient evidence to formulate a 'What We Looked For', 'What We Found', and 'Score Rationale' for this category; this category will be weighted less.
Supporting Evidence
Listed in the company’s integration directory, OpenText IAM supports various third-party integrations.
— opentext.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Documentation can be fragmented or difficult to navigate, with some users noting challenges in finding specific configuration details.
Impact: This issue had a noticeable impact on the score.
CDW's Identity and Access Management (IAM) solutions are designed to cater to the robust security needs of digital marketing agencies. These solutions seamlessly control both internal and cloud-based services, ensuring secure access and protecting sensitive data from potential breaches.
CDW's Identity and Access Management (IAM) solutions are designed to cater to the robust security needs of digital marketing agencies. These solutions seamlessly control both internal and cloud-based services, ensuring secure access and protecting sensitive data from potential breaches.
24/7 SUPPORT
CLOUD-BASED
Best for teams that are
Organizations seeking managed services and expert consulting
Companies wanting to outsource IAM strategy and implementation
Enterprises needing to procure multiple vendor solutions
Skip if
SMBs seeking a direct-purchase, self-serve SaaS tool
Teams wanting immediate deployment without sales engagement
Companies looking for a single proprietary software vendor
Expert Take
Our analysis shows CDW IAM Solutions excels in orchestrating complex, multi-vendor identity environments. Research indicates their strength lies in vendor-agnostic strategy and implementation, bolstered by the acquisition of Focal Point Data Risk. While they do not build the software themselves, their ability to assess, design, and manage solutions from partners like Okta and Microsoft makes them a powerful ally for enterprises needing bespoke security architectures.
Pros
Vendor-agnostic solution selection
Deep technical implementation expertise
Comprehensive lifecycle management
Strong regulatory compliance focus
Access to top-tier partners
Cons
Higher pricing than competitors
Inconsistent support for SMBs
Dependent on third-party software
Opaque pricing structure
Account management responsiveness issues
This score is backed by structured Google research and verified sources.
Overall Score
9.3/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
8.9
Category 1: Product Capability & Depth
What We Looked For
We look for comprehensive identity management features including SSO, MFA, lifecycle management, and privileged access control tailored to complex enterprise needs.
What We Found
CDW delivers a full spectrum of IAM services including strategy, assessments, and implementation for major platforms like Microsoft Entra ID, Okta, Ping Identity, and CyberArk, covering IGA, PAM, and CIAM use cases.
Score Rationale
The score reflects their ability to deliver enterprise-grade capabilities across every major IAM discipline through top-tier partnerships, though they rely on partner technology rather than proprietary software.
Supporting Evidence
Portfolio includes partnerships with Microsoft, Okta, IBM Security Verify, Ping Identity, and CyberArk. Examples of CDW IAM partners that offer solutions for managing digital identities include: Microsoft Entra ID... Okta Identity Cloud... IBM Security Verify... Ping Identity... CyberArk.
— cdw.com
Offers full lifecycle support from program design to management for IAM, IGA, and PAM implementations. CDW has the most complete portfolio of IAM services in the market... We offer support at any phase of the lifecycle, from initial program design to long-term management and support.
— webobjects2.cdw.com
9.2
Category 2: Market Credibility & Trust Signals
What We Looked For
We look for established market presence, financial stability, and proven expertise in delivering security solutions to large organizations.
What We Found
As a Fortune 500 company with over 15 years of IAM focus, CDW reinforced its credibility by acquiring Focal Point Data Risk to deepen its security consulting and identity management expertise.
Score Rationale
Their status as a major global technology provider combined with strategic acquisitions to bolster security expertise justifies a premium trust score.
Supporting Evidence
CDW has over 15 years of focus on IAM and is considered a market leader in modernizing enterprise identity programs. With more than 15 years of focus on IAM, CDW is a market leader in modernizing, streamlining and automating enterprise identity programs.
— webobjects2.cdw.com
Acquired Focal Point Data Risk to expand identity and access management capabilities. Focal Point enables CDW to deliver identity management and data protection services across the technology lifecycle.
— msspalert.com
8.2
Category 3: Usability & Customer Experience
What We Looked For
We look for responsive support, ease of engagement, and effective service delivery that minimizes friction for the client's IT team.
What We Found
While their technical engineering teams are praised for expertise, recent customer feedback highlights significant issues with account management responsiveness and declining service quality for non-enterprise clients.
Score Rationale
The score is impacted by documented complaints regarding unresponsive account representatives and support challenges for smaller businesses, despite high-quality engineering.
Supporting Evidence
Technical engineers are knowledgeable but often overworked, impacting service continuity. The SME's at CDW are people who are extremely good at what they do, but the company just doesn't let them dwell on any work.
— reddit.com
Users report difficulty reaching sales teams and account managers, with long wait times and unresponsive emails. 30+ minutes on the phone waiting for someone on their sales team... emails to sales going weeks with no answer.
— reddit.com
8.0
Category 4: Value, Pricing & Transparency
What We Looked For
We look for competitive pricing structures, clear cost visibility, and a demonstrable return on investment compared to direct vendor engagement.
What We Found
Pricing is custom-quoted and often described by users as higher than competitors, with some reports citing a premium of up to 30% for hardware and services compared to other channels.
Score Rationale
The lack of public pricing combined with consistent user reports of higher costs compared to competitors limits the score in this category.
Supporting Evidence
Pricing is not publicly listed and requires engagement with account managers. Please complete this short form and an expert will be in touch
— cdw.com
User reports indicate CDW pricing can be significantly higher than competitors. Anything I buy off cdw is roughly 30% more expensive than competitors.
— reddit.com
9.1
Category 5: Security, Compliance & Data Protection
What We Looked For
We look for expertise in regulatory frameworks, Zero Trust architecture, and the ability to secure sensitive data against modern threats.
What We Found
They offer specialized assessments for Zero Trust and regulatory compliance (GDPR, HIPAA), supported by the deep security consulting capabilities acquired through Focal Point Data Risk.
Score Rationale
The combination of specialized security consulting acquisitions and alignment with frameworks like Zero Trust and CARTA supports a high score.
Supporting Evidence
Assessments help organizations meet regulations like GDPR, HIPAA, and ISO 27001. IAM ensures secure identity management and access controls that align with regulations like GDPR, HIPAA and ISO 27001.
— cdw.com
Services are aligned with Zero Trust, CARTA, and identity-centric security frameworks. Our identity services are wholly aligned with the latest Zero Trust, CARTA and identity-centric security frameworks.
— webobjects2.cdw.com
9.4
Category 6: Integrations & Ecosystem Strength
What We Looked For
We look for the ability to integrate with a wide range of existing IT infrastructure, applications, and third-party security tools.
What We Found
CDW's vendor-agnostic approach allows them to architect and integrate solutions involving virtually any major IAM vendor, including Microsoft, Okta, Ping, and Delinea, into complex hybrid environments.
Score Rationale
Their strength lies in their ability to act as a universal integrator, leveraging a massive portfolio of partner technologies to fit any client ecosystem.
Supporting Evidence
Solutions span internal and cloud-based services, integrating with platforms like Microsoft 365 and Google Workspace. Yes, modern IAM solutions support cloud integration, securing access to SaaS applications like Google Workspace and Microsoft 365.
— cdw.com
Partnerships extend to major vendors like Delinea, enhancing their ability to offer differentiated cybersecurity solutions. By partnering with CDW, Delinea continues to reach broader markets... adding differentiated, high-value cybersecurity solutions to their portfolio.
— delinea.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Multiple customer reports indicate pricing is often higher than competitors, with some citing a premium of around 30%.
Impact: This issue caused a significant reduction in the score.
Users report significant difficulties in reaching account representatives and receiving timely support, particularly for small to mid-sized businesses.
Impact: This issue caused a significant reduction in the score.
Thales IAM Solution is an industry-specific Identity and Access Management software designed for Digital Marketing Agencies. It provides robust security by managing and authenticating the identities of individuals accessing the system, which is crucial in the data-driven environment of digital marketing.
Thales IAM Solution is an industry-specific Identity and Access Management software designed for Digital Marketing Agencies. It provides robust security by managing and authenticating the identities of individuals accessing the system, which is crucial in the data-driven environment of digital marketing.
SMBs looking for a modern, consumer-grade user interface
Teams wanting a developer-first, self-service platform
Organizations prioritizing ease of use over security depth
Expert Take
Our analysis shows Thales SafeNet Trusted Access stands out for its ability to bridge the gap between modern cloud access and high-assurance physical security. Research indicates it is particularly strong for organizations requiring FIPS-validated hardware tokens and PKI integration alongside standard SSO features. Based on documented features, its all-inclusive pricing model that bundles tokens with licenses offers exceptional transparency and value for high-security environments.
Pros
All-inclusive pricing model includes hardware/software tokens
Strong support for FIDO2 and PKI hardware keys
Granular scenario-based access policies
High compliance standards (FIPS 140-2, FedRAMP)
Unified management of cloud and on-premise access
Cons
Customer support response times can be slow
Admin interface described as cumbersome by some users
Integration documentation lacks clarity for complex scenarios
Advanced features may require steep learning curve
This score is backed by structured Google research and verified sources.
Overall Score
9.2/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
9.1
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of access management features, including SSO, MFA options, and policy granularity.
What We Found
Thales SafeNet Trusted Access (STA) offers a robust policy engine supporting diverse authentication methods including FIDO2, PKI, and hardware tokens, alongside standard SSO capabilities.
Score Rationale
The score reflects the platform's exceptional versatility in authentication methods and granular scenario-based policies, though it is slightly tempered by reported complexity in advanced configurations.
Supporting Evidence
The solution supports a wide array of authentication methods including FIDO2, PKI smart cards, and pattern-based auth. Offering contextual/adaptive and modern authentication capabilities, through high-assurance FIDO devices, as well as Push and pattern-based authentication
— thalestct.com
STA provides a 'simple to use policy engine' that enforces policies at individual user, group, or application levels. SafeNet Trusted Access offers flexible access management through a simple to use policy engine that gives customers real-time control over the ability to enforce policies at the individual user, group or application level.
— cpl.thalesgroup.com
Documented in official product documentation, Thales IAM Solution offers advanced identity authentication features crucial for data security.
— cpl.thalesgroup.com
9.4
Category 2: Market Credibility & Trust Signals
What We Looked For
We assess the vendor's industry standing, security certifications, and history of reliability in the IAM space.
What We Found
Thales, having acquired Gemalto, is a global leader in digital security with extensive certifications including ISO 27001, SOC 2 Type II, and FedRAMP readiness.
Score Rationale
The score is near-perfect due to Thales' massive footprint in defense and security, backed by the acquisition of Gemalto and rigorous government-grade compliance standards.
Supporting Evidence
The platform holds major certifications including SOC 2 Type II and ISO 27001. Thales' OneWelcome Identity Platform, SafeNet Trusted Access, and IdCloud solutions successfully completed the AISPA Service Organization Control (SOC) Type II audit.
— cpl.thalesgroup.com
Thales acquired Gemalto in 2019, consolidating its position as a leader in digital identity and security. Thales (Euronext Paris: HO) has today completed the acquisition of Gemalto... creating a global leader in digital identity and security.
— danish-french.com
8.4
Category 3: Usability & Customer Experience
What We Looked For
We examine user interface design, ease of deployment, and quality of customer support based on user feedback.
What We Found
While end-user authentication is smooth, administrators report that the management UI can be cumbersome and technical support is sometimes slow to resolve complex issues.
Score Rationale
This category scores lower than others because multiple independent reviews cite 'integration issues' and 'poor customer support' as notable friction points for administrators.
Supporting Evidence
Some administrators find the UI features and integration options 'cumbersome and unintuitive'. It has great capabilities, but for some options like integration and UI features are cumbersome and unintuitive.
— g2.com
Users have reported frustration with slow support responses for advanced technical features. Users find Thales SafeNet Trusted Access' poor customer support frustrating, especially for advanced technical issues requiring quick resolutions.
— g2.com
Outlined in user manuals, the solution offers 24/7 support, ensuring continuous assistance for digital marketing agencies.
— cpl.thalesgroup.com
9.0
Category 4: Value, Pricing & Transparency
What We Looked For
We evaluate pricing models, transparency, and inclusion of essential features like tokens in the base cost.
What We Found
Thales offers a transparent, all-inclusive pricing model that notably includes hardware or software tokens in the license cost, avoiding hidden fees.
Score Rationale
The score is high because the 'all-in-one license' model that includes tokens is a significant value differentiator compared to competitors who charge separately for authenticators.
Supporting Evidence
One hardware token can be ordered free of charge with the initial subscription purchase. One OTP110 token can be ordered Free of Charge with the initial purchase of an STA subscription.
— assets.applytosupply.digitalmarketplace.service.gov.uk
The pricing model is all-inclusive, covering access management, authentication, and tokens without extra costs. With our pricing model you get an all in one license that includes access management and authentication with no hidden costs, no extra costs for tokens or support.
— cpl.thalesgroup.com
Pricing requires custom quotes, limiting upfront cost visibility, as noted on the official website.
— cpl.thalesgroup.com
9.3
Category 5: Authentication Versatility & Hardware Support
What We Looked For
We look for the range of supported authentication methods, specifically bridging physical hardware and cloud software.
What We Found
The solution uniquely bridges cloud IAM with physical security, supporting FIDO2, PKI smart cards, and classic OTP hardware tokens in a single platform.
Score Rationale
The ability to manage FIDO, PKI, and OTP hardware tokens alongside software authenticators in one cloud console justifies a top-tier score for versatility.
Supporting Evidence
The platform allows organizations to leverage existing investments in authentication schemes. The policy engine supports a broad range of authentication methods, including ones already deployed, allowing organizations to leverage their current investments
— cpl.thalesgroup.com
STA supports a broad range of methods including FIDO2, PKI smart cards, and Google Authenticator. Supported Authentication Methods... OTP Hardware (Thales native and 3d Party)... FIDO 2... PKI smart cards and credentials
— thalestct.com
Listed in the company’s integration directory, the solution supports easy integration with existing systems.
— cpl.thalesgroup.com
9.6
Category 6: Security, Compliance & Data Protection
What We Looked For
We analyze the product's adherence to high-security standards, government regulations, and encryption capabilities.
What We Found
Thales excels here with FIPS 140-2 validated tokens, FedRAMP support, and a strong heritage in hardware security modules (HSMs) and encryption.
Score Rationale
This is the product's strongest area, leveraging Thales' defense background to offer government-grade security compliance that few SaaS competitors can match.
Supporting Evidence
Hardware tokens provided are FIPS 140-2 certified, meeting high government security standards. SafeNet eToken 5300 is FIPS 140-2 (mini is level 3 and micro is level 2) certified and holds Common Criteria EAL 6+ certification at the chip boundary.
— cpl.thalesgroup.com
Thales helps federal agencies meet FedRAMP compliance standards. Thales helps Federal Government agencies and their suppliers meet these FedRAMP compliance standards.
— cpl.thalesgroup.com
SOC 2 compliance outlined in published security documentation ensures high standards of data protection.
— cpl.thalesgroup.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Administrators describe the integration process and UI features as 'cumbersome and unintuitive' in some scenarios.
Impact: This issue caused a significant reduction in the score.
Rippling's identity and access management software is meticulously designed to cater to the specific needs of digital marketing agencies. It centralizes the process of setting up, managing, and disabling employee apps, providing a unified platform for seamless identity access management. Its robust features ensure secure access and compliance, a key requirement for agencies handling client data.
Rippling's identity and access management software is meticulously designed to cater to the specific needs of digital marketing agencies. It centralizes the process of setting up, managing, and disabling employee apps, providing a unified platform for seamless identity access management. Its robust features ensure secure access and compliance, a key requirement for agencies handling client data.
SCALABLE SOLUTIONS
Best for teams that are
Mid-sized companies unifying HR and IT management
Remote teams needing automated device and app provisioning
Organizations wanting to automate access based on HR data
Skip if
Enterprises with complex, separate legacy HRIS systems
Companies needing standalone IAM without HR features
Organizations requiring on-premise infrastructure
Expert Take
Our analysis shows Rippling uniquely solves the 'stale data' problem in identity management by using the HRIS as the single source of truth. Research indicates that because access policies are tied directly to employee data, provisioning and deprovisioning happen instantly when HR updates a role or employment status. This tight integration between HR and IT eliminates the manual friction found in standalone identity tools.
Pros
Unified HR and IT data source
Automated onboarding and offboarding
600+ pre-built app integrations
Built-in device management (MDM)
Granular role-based access control
Cons
Requires core HRIS subscription
Support restricted to admins only
Pricing requires custom quote
Steep learning curve for advanced rules
Mobile app limited for admin tasks
This score is backed by structured Google research and verified sources.
Overall Score
8.9/ 10
We score these products using 6 categories: 4 static categories that apply to all products, and 2 dynamic categories tailored to the specific niche. Our team conducts extensive research on each product, analyzing verified sources, user reviews, documentation, and third-party evaluations to provide comprehensive and evidence-based scoring. Each category is weighted with a custom weight based on the category niche and what is important in Identity & Access Management Software for Digital Marketing Agencies. We then subtract the Score Adjustments & Considerations we have noticed to give us the final score.
9.0
Category 1: Product Capability & Depth
What We Looked For
We evaluate the breadth of identity features, including SSO, MFA, lifecycle management, and the ability to handle complex provisioning workflows.
What We Found
Rippling combines Identity and Access Management (IAM) with Device Management (MDM) and HRIS data, allowing for automated provisioning across 600+ apps based on employee role, department, and status.
Score Rationale
The score is high due to the unique integration of device and identity management driven by HR data, though it stops short of a perfect score due to reported learning curves for complex admin tasks.
Supporting Evidence
Includes built-in password management (RPass) for apps that do not support SSO. For apps that don't support SSO... Rippling includes RPass, a built-in password manager.
— rippling.com
The platform supports automated user provisioning across over 600 business applications. Rippling has over 600 integrations with other SaaS products for user provisioning and deprovisioning, Single Sign On, attribute syncing, and more.
— rippling.com
Rippling unifies directory, identity, MDM, and HRIS so access, policies, and device lifecycle updates follow employee data automatically. Rippling IT — it unifies directory, identity, MDM, and HRIS so access, policies, and device lifecycle updates follow employee data automatically.
— rippling.com
Comprehensive compliance management is outlined in Rippling's security policies.
— rippling.com
Documented in official product documentation, Rippling centralizes app management for seamless identity access.
— rippling.com
9.2
Category 2: Market Credibility & Trust Signals
What We Looked For
We assess market presence, user adoption, third-party reviews, and the reliability of the vendor in the enterprise software space.
What We Found
Rippling holds dominant ratings on major review platforms like G2 and Capterra, backed by a large user base and significant venture capital funding.
Score Rationale
With a 4.8/5 rating from over 10,000 reviews on G2 and strong market momentum, credibility is exceptional, though it is a younger player compared to legacy giants like Okta.
Supporting Evidence
Capterra rates the platform 4.9 out of 5 stars with over 4,160 reviews. Capterra rates it 4.9 out of 5 stars with 4,160+ reviews.
— rippling.com
Rippling holds a 4.8 out of 5 star rating on G2 based on over 10,000 user reviews. G2 gives it 4.8 out of 5 stars based on over 10,000 reviews.
— rippling.com
8.9
Category 3: Usability & Customer Experience
What We Looked For
We look for intuitive design, ease of setup, quality of documentation, and the responsiveness of customer support channels.
What We Found
Users consistently praise the clean, modern interface and fast onboarding, though some report a steep learning curve for advanced automation features and gated support access.
Score Rationale
The interface is widely considered best-in-class for modern SaaS, but the score is impacted by the support policy that restricts direct employee access to help desks.
Supporting Evidence
Support is gated; individual employees cannot contact Rippling support directly and must go through their company admin. An individual employee with an issue must contact your administrator... and then the administrator must contact Rippling.
— connecteam.com
Users describe the app as intuitive and praise the automation, though some note a learning curve for complex features. I've seen users describe the app as “intuitive” and praise the automation... Users find the learning curve steep with Rippling's features.
— employborderless.com
Streamlined user interface documented in product overview.
— rippling.com
8.5
Category 4: Value, Pricing & Transparency
What We Looked For
We evaluate pricing models, hidden fees, contract terms, and whether the product offers good ROI relative to competitors.
What We Found
Rippling uses a modular pricing model starting at $8/user/month, but requires the core HRIS platform and hides final costs behind custom quotes.
Score Rationale
While the starting price is competitive, the requirement to purchase the core Unity platform and the lack of public pricing transparency lower the score.
Supporting Evidence
Users must purchase the HRIS platform (Unity) to access Identity products, which may not suit companies just looking for standalone IAM. Before you can access any other Rippling feature, you'll need to subscribe to Rippling Unity.
— accessowl.com
There is a mandatory base platform fee starting at $35 per month in addition to per-user costs. Rippling requires a mandatory base platform fee starting at $35 per month.
— cloudappcritic.com
Pricing for Identity Management starts at $8 per user per month, but requires the core platform. For identity and access management, pricing starts at $8 per user per month... You'll need to subscribe to Rippling Unity.
— rippling.com
Custom pricing model offers flexibility but may limit upfront cost visibility.
— rippling.com
9.1
Category 5: Integrations & Ecosystem Strength
What We Looked For
We examine the library of pre-built integrations, API quality, and support for standards like SAML, SCIM, and OIDC.
What We Found
The platform boasts over 600 pre-built integrations with deep provisioning capabilities, plus support for custom SAML and SCIM apps.
Score Rationale
The ecosystem is vast and deeply integrated, allowing for granular attribute mapping and automated provisioning that outperforms many standalone competitors.
Supporting Evidence
Integrations include deep features like Google license management and offboarding actions. Rippling is a reseller for Google, allowing you to manage and purchase licensing directly within Rippling.
— rippling.com
The platform supports custom app integrations via SAML, JIT, and SCIM. Build custom integrations to provide SSO with SAML, provisioning with JIT or SCIM.
— rippling.com
Rippling offers over 600 out-of-the-box integrations for SSO and provisioning. Rippling has over 600 integrations with other SaaS products for user provisioning and deprovisioning.
— rippling.com
Listed in the company’s integration directory, Rippling supports integration with major platforms.
— rippling.com
9.3
Category 6: Security, Compliance & Data Protection
What We Looked For
We review security certifications, encryption standards, compliance tools, and features like MFA and device enforcement.
What We Found
Rippling maintains an impressive array of certifications including SOC 2 Type II, ISO 27001, and the rare ISO 42001 for AI safety.
Score Rationale
The security posture is enterprise-grade, evidenced by a comprehensive list of ISO certifications and built-in compliance enforcement tools.
Supporting Evidence
Data is protected with AES-256 encryption at rest and in transit. All data is protected with AES-256 encryption, both at rest and in transit.
— rippling.com
The platform enables granular role-based access controls and dynamic permission rules. Dynamic role-based access control using employee attributes.
— rippling.com
Rippling maintains SOC 2 Type II, ISO 27001, ISO 27018, and ISO 42001 certifications. Rippling's ISO 42001 certification demonstrates our commitment to secured and governed AI management.
— rippling.com
SOC 2 compliance outlined in published security documentation.
— rippling.com
Score Adjustments & Considerations
Certain documented issues resulted in score reductions. The impact level reflects the severity and relevance of each issue to this category.
Opaque Pricing: Specific costs for modules and implementation are not publicly listed and require a sales quote, with reports of hidden implementation fees.
Impact: This issue caused a significant reduction in the score.
Platform Dependency: Customers cannot purchase Identity Management as a standalone product; subscription to the core HRIS 'Unity' platform is mandatory.
Impact: This issue caused a significant reduction in the score.
The methodology for selecting and ranking Identity & Access Management (IAM) software for digital marketing agencies involved a comprehensive evaluation of key factors such as specifications, features, customer reviews, and overall ratings. In this category, particular considerations included the software's scalability, integration capabilities with marketing tools, user interface, and compliance with data protection regulations, which are critical for agencies managing sensitive client information. The research approach used to determine product rankings focused on analyzing available data, comparing specifications and customer feedback, and evaluating the price-to-value ratio to ensure that the selected solutions meet the specific needs of digital marketing agencies effectively.
Overall scores reflect relative ranking within this category, accounting for which limitations materially affect real-world use cases. Small differences in category scores can result in larger ranking separation when those differences affect the most common or highest-impact workflows.
Verification
Products evaluated through comprehensive research and analysis of industry standards and expert insights.
Rankings based on analysis of user feedback, feature sets, and market reputation for identity and access management solutions.
Selection criteria focus on security features, integration capabilities, and user experience within the digital marketing agency landscape.
As an Amazon Associate, we earn from qualifying purchases. We may also earn commissions from other affiliate partners.
×
Score Breakdown
0.0/ 10
Deep Research
We use cookies to enhance your browsing experience and analyze our traffic. By continuing to use our website, you consent to our use of cookies.
Learn more