Hitachi ID Systems Hitachi ID Management Suite v8.0
October 01, 2012
Hitachi ID Systems, Inc.Product:
Starts at $30/user (varies with quantity).
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Simplicity and integration with other products.
- Weaknesses: Large number of tables to navigate and more use of graphics.
- Verdict: This is a great entry point into identity and access management (IAM).
The Hitachi ID Management Suite is primarily made up of three modules: Hitachi ID Identity Manager, which helps manage identities and provisioning across multiple systems and applications; Hitachi ID Password Manager; and Hitachi ID Privileged Access Manager. The system provides automation to the access request process, as well as a user self-service function. The Hitachi ID Identity Manager provides the ability to automate granting and revoking access, helps keep identity attributes consistent across applications, delegates administration to stakeholders, and provides analytics for role entitlements and identity data. Hitachi ID Password Manager features password synchronization, self-service password, PIN reset (on smart cards and OTP tokens), enterprise single sign-on, enrollment of biometrics and security questions, and recovery of full disk encryption keys. The Hitachi ID Privileged Access Manager features include randomization and vaulting of privileged passwords and audit reporting.
The installation tools came on a single USB device with a simple "setup.exe" installer. Additional .msi tools were also included. The installation quick-start document provided an easy-to-read set of installation instructions with references to additional documentation if the installer wanted to employ more advanced setup. System installation prerequisites included a virtual or standard server-class machine and either a MS SQL Server or Oracle database. Once the database was registered and settings were worked out, our product install went pretty smoothly. Even though there was a good set of documentation available, once inside the product, the setup was intuitive. The tool used data entry templates throughout making it easy to add policies and a vast number of other settings. Auditing and reporting was simple and pretty straightforward featuring a solid array of reporting. Some of the highlighted reporting options included orphan and dormant accounts, segregation of duties violations and detailed change history. The product did make use of a large number of acronyms and abbreviations, but the descriptions for each configurable item made navigating the settings fairly easy to understand. The performance of the system was robust without any of the usual lag time waiting for reports to run. Hitachi provided a great set of documentation that was used to dig around and find options and features to evaluate. This is a solid tool if you are looking for straightforward and easy-to-use identity and access management (IAM).
Hitachi provides basic tech support from 2:00 a.m. to 8:00 p.m. (EST) Monday-Friday, covering updates and upgrades, as well as aid via email, telephone, WebEx and VPN. The company also offers optional emergency incident response service for an additional fee. This provides 24/7 assistance with a 90-minute response time. It also offers a knowledge base and FAQ. The basic support fee is 20 percent of license fees annually. The optional service offering is an additional five percent of the cost of the software license. Coupled with a product price starting at $30 per user, this is a real value for an organization looking to get started in enterprise single sign-on, access control and provisioning.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Harman Kardon claims only Chrysler vehicles may have vulnerable system
- Government 'Cybersecurity Sprint' spurs agency authentication measures
- Hackers spread malware via Yahoo ads
- Report: News, entertainment websites serve majority of malvertisements
- UConn School of Engineering cyberintrusion originated in China