McAfee Cloud Identity Manager
October 01, 2012
Up to a maximum of $5 per month per user. Contact McAfee for details.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Integrated user management for cloud-based applications.
- Weaknesses: Niche product with limited scope of features.
- Verdict: If you need the specific features this tool provides, you should give it a closer look.
The Cloud Identity Manager from McAfee helps administrators provide single sign-on and account provisioning for cloud-based applications. Beyond just offering single sign-on, this product also can incorporate two-factor authentication to various cloud applications right out of the box. Two-factor authentication options include phone-based soft tokens, as well as other options, including Intel Identity Protection Technology (IPT) and facial recognition.
We found this product to be quite easy to install and configure. The initial installation consisted of simply running an executable installer on what will be the server for the product. This product is supported both on Windows and Linux server operating systems, which provides excellent deployment flexibility for many different environments. The installation itself was guided by a short, easy-to-follow setup wizard, which gathered all required information for initial setup and configuration. After the install was completed, all further management and configuration was done using the web-based management console. We found this console to be easy to navigate with an intuitive and organized layout and we had no trouble at all configuring or managing the product.
We also found this product to integrate very well with the existing infrastructure. For user management and authentication, the Cloud Identity Manager integrates directly with the Microsoft Active Directory or LDAP authentication database already in place. As for connecting with applications, this product includes a number of connectors that are ready to go right out of the box, including Salesforce.com and Google applications, as well as direct integration with SharePoint and .Net Framework. Cloud Identity Manager also includes functionality for building custom connectors for in-house applications.
Documentation included installation and administrator guides, as well as supplemental materials for installing and configuring various connectors. The installation guide provides clear, step-by-step instructions on the initial setup and installation of the product, while the administrator guide offers much more detail on advanced configuration, as well as overall management of the product. We found all documentation to be well-organized and easy to follow with many screen shots, diagrams and configuration examples.
McAfee includes full 24/7 phone- and email-based technical support as part of the ongoing subscription cost of the product. Customers also can access a support area via the website, which includes resources, such as product documentation, user forums and downloads.
At a price up to a maximum of $5 per month per user (contact McAfee for details), we found the McAfee Cloud Identity Manager to be a good value for the money. This product fills a very good niche of managing and provisioning users for companies and organizations that are hosting applications in their own private cloud or have their applications hosted as a SaaS offering. The only downside we see to this product is that it is a subscription-based tool, which requires ongoing maintenance and overhead costs - something that needs to be evaluated when purchasing a product.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed