McAfee Cloud Identity Manager
October 01, 2012
Up to a maximum of $5 per month per user. Contact McAfee for details.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Integrated user management for cloud-based applications.
- Weaknesses: Niche product with limited scope of features.
- Verdict: If you need the specific features this tool provides, you should give it a closer look.
The Cloud Identity Manager from McAfee helps administrators provide single sign-on and account provisioning for cloud-based applications. Beyond just offering single sign-on, this product also can incorporate two-factor authentication to various cloud applications right out of the box. Two-factor authentication options include phone-based soft tokens, as well as other options, including Intel Identity Protection Technology (IPT) and facial recognition.
We found this product to be quite easy to install and configure. The initial installation consisted of simply running an executable installer on what will be the server for the product. This product is supported both on Windows and Linux server operating systems, which provides excellent deployment flexibility for many different environments. The installation itself was guided by a short, easy-to-follow setup wizard, which gathered all required information for initial setup and configuration. After the install was completed, all further management and configuration was done using the web-based management console. We found this console to be easy to navigate with an intuitive and organized layout and we had no trouble at all configuring or managing the product.
We also found this product to integrate very well with the existing infrastructure. For user management and authentication, the Cloud Identity Manager integrates directly with the Microsoft Active Directory or LDAP authentication database already in place. As for connecting with applications, this product includes a number of connectors that are ready to go right out of the box, including Salesforce.com and Google applications, as well as direct integration with SharePoint and .Net Framework. Cloud Identity Manager also includes functionality for building custom connectors for in-house applications.
Documentation included installation and administrator guides, as well as supplemental materials for installing and configuring various connectors. The installation guide provides clear, step-by-step instructions on the initial setup and installation of the product, while the administrator guide offers much more detail on advanced configuration, as well as overall management of the product. We found all documentation to be well-organized and easy to follow with many screen shots, diagrams and configuration examples.
McAfee includes full 24/7 phone- and email-based technical support as part of the ongoing subscription cost of the product. Customers also can access a support area via the website, which includes resources, such as product documentation, user forums and downloads.
At a price up to a maximum of $5 per month per user (contact McAfee for details), we found the McAfee Cloud Identity Manager to be a good value for the money. This product fills a very good niche of managing and provisioning users for companies and organizations that are hosting applications in their own private cloud or have their applications hosted as a SaaS offering. The only downside we see to this product is that it is a subscription-based tool, which requires ongoing maintenance and overhead costs - something that needs to be evaluated when purchasing a product.
Sign up to our newsletters
SC Magazine Articles
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Report: $19M breach settlement between MasterCard, Target terminated
- Logjam attack exposes data passed over TLS connections
- Google releases Chrome 43, addresses 37 bugs
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Senate fails to pass USA Freedom Act; McConnell moves for revote of Patriot Act extension
- Android ransomware distributed to English speakers in spam campaign
- Site operator sentenced to 13 months for facilitating prostitution
- ISA presses for data to shape cyber security policy, encourages use of NIST framework
- Former Jacobi Medical Center employee improperly emails patient data