Categories:

#38

Entrust Identity Enterprise is ranked #38 in the IAM Software product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

Entrust Identity Enterprise Pricing

Based on our most recent analysis, Entrust Identity Enterprise pricing starts in the range of $1,000 or more.

Price
$
$
$
$
$
i
Starting From
Undisclosed
Pricing Model
Monthly, Quote-based
Free Trial
Yes, Request for Free

Training Resources

Entrust Identity Enterprise is supported with the following types of training:

Documentation
In Person
Live Online
Videos
Webinars

Support

The following support services are available for Entrust Identity Enterprise:

Email
Phone
Chat
FAQ
Forum
Help Desk
Knowledge Base
Tickets
Training
24/7 Live Support

Entrust Identity Enterprise Benefits and Insights

Why use Entrust Identity Enterprise?

Key differentiators & advantages of Entrust Identity Enterprise

  • Enhanced Security: Entrust Identity Enterprise provides robust security measures, including multi-factor authentication and encryption, to protect sensitive data and prevent unauthorized access.
  • Streamlined User Experience: The software offers a seamless and intuitive interface, reducing the learning curve for users and improving overall productivity.
  • Scalability: Easily scale your identity and access management solutions to accommodate growing user bases and evolving organizational needs without compromising performance.
  • Compliance Support: Helps organizations meet regulatory requirements such as GDPR, HIPAA, and SOX by providing comprehensive audit trails and reporting capabilities.
  • Cost Efficiency: Reduces operational costs by automating identity management tasks, minimizing the need for manual intervention and reducing the risk of human error.
  • Improved Access Control: Granular access control policies ensure that users have the appropriate level of access to resources, enhancing security and operational efficiency.
  • Integration Capabilities: Easily integrates with existing IT infrastructure and third-party applications, ensuring a smooth implementation process and reducing disruption.
  • Enhanced User Productivity: Single sign-on (SSO) capabilities allow users to access multiple applications with one set of credentials, reducing login times and increasing efficiency.
  • Centralized Management: Provides a unified platform for managing identities and access across the organization, simplifying administrative tasks and improving oversight.
  • Risk Mitigation: Advanced analytics and monitoring tools help identify and mitigate potential security threats before they can cause harm.
  • Customizable Policies: Allows for the creation of tailored access policies that align with specific business requirements and security protocols.
  • Enhanced Collaboration: Facilitates secure collaboration between internal and external stakeholders by ensuring that only authorized users have access to shared resources.
  • Reduced Downtime: High availability and disaster recovery features ensure that identity and access management services remain operational even during unexpected events.
  • Future-Proofing: Regular updates and support ensure that the software remains current with the latest security standards and technological advancements.

Industry Expertise

Entrust Identity Enterprise is a robust on-premises identity and access management (IAM) solution that boasts over 25 years of experience serving high-assurance applications for large organizations, including Fortune 500 companies, government agencies, and consumer banking institutions. It's particularly well-suited for organizations with thousands or even millions of users who are seeking a Zero Trust approach to security.

Synopsis of User Ratings and Reviews

Based on an aggregate of Entrust Identity Enterprise reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • Strong Security: Employs a Zero Trust model and offers advanced multifactor authentication (MFA) options like PKI certificates and mobile smart credentials.
  • Flexible Authentication: Supports a wide array of authenticators, including OATH tokens, push notifications, and biometric options, catering to diverse user preferences and security needs.
  • Centralized Management: Provides a single platform to manage both workforce and consumer identities, streamlining administrative tasks and reducing IT overhead.
  • Passwordless Options: Enables passwordless login for both employees, using methods like certificate-based authentication, and consumers, through biometrics or FIDO tokens, enhancing security and user experience.

Cons

  • Implementation Complexity: Getting Entrust Identity Enterprise up and running can be a bit like assembling a complex machine; it takes time and expertise to configure correctly.
  • Price Tag: For smaller businesses or those with tight budgets, the cost of Entrust Identity Enterprise might be a significant barrier to entry.
  • Support Concerns: While some users have positive experiences, others report slow response times from customer support, which can be frustrating when dealing with urgent identity and access issues.

Researcher's Summary:

Can you entrust Entrust Identity Enterprise to manage your organization's digital keys? User reviews from the past year suggest a mixed bag. While Entrust Identity Enterprise is praised for its robust security features, including its sophisticated risk engine and alignment with the CISA zero trust framework, some users find its feature set lacking compared to competitors like Cisco Duo. For example, users appreciate Entrust's strong multifactor authentication (MFA) capabilities and user-friendly interface, but some note that Cisco Duo offers a more comprehensive and satisfying user experience. This difference in user satisfaction could be attributed to factors like a wider range of features or a more intuitive design in Cisco Duo's offerings.

Entrust Identity Enterprise shines in its ease of use, particularly for managing identities and access efficiently. Its password reset capabilities and transaction verification features streamline common tasks for both workforce and consumer use cases. However, some users have pointed out that the cost of Entrust Identity Enterprise can be a bit steep, especially when compared to alternatives in the market. This pricing difference might be a deciding factor for organizations with tighter budgets or those looking for more cost-effective solutions.

Overall, Entrust Identity Enterprise appears to be a good fit for organizations prioritizing robust security and ease of use, particularly those already invested in or comfortable with the Entrust ecosystem. However, organizations seeking the most feature-rich solution or those on a tighter budget might find better value in exploring alternative offerings from competitors like Cisco Duo.

Key Features

Notable Entrust Identity Enterprise features include:

  • Adaptive Authentication: Utilizes machine learning to assess risk and adjust authentication requirements dynamically.
  • Single Sign-On (SSO): Provides seamless access to multiple applications with one set of credentials, enhancing user convenience and security.
  • Multi-Factor Authentication (MFA): Supports various authentication methods such as biometrics, OTPs, and smart cards to ensure robust security.
  • Identity Federation: Enables secure sharing of identity information across different domains and organizations using standards like SAML and OAuth.
  • Role-Based Access Control (RBAC): Allows administrators to assign permissions based on user roles, simplifying access management.
  • Self-Service Password Reset: Empowers users to reset their passwords without IT intervention, reducing helpdesk workload.
  • Comprehensive Reporting: Offers detailed audit logs and compliance reports to help organizations meet regulatory requirements.
  • API Integration: Provides robust APIs for integrating with existing systems and applications, ensuring flexibility and scalability.
  • Lifecycle Management: Automates user provisioning and de-provisioning processes, ensuring timely access updates.
  • Contextual Access Policies: Allows for the creation of policies based on user context, such as location and device, to enhance security.
  • Delegated Administration: Enables the distribution of administrative tasks to different levels within the organization, improving efficiency.
  • Mobile Device Management (MDM) Integration: Ensures secure access from mobile devices by integrating with MDM solutions.
  • Customizable User Interface: Offers a flexible UI that can be tailored to meet the specific needs and branding of the organization.
  • High Availability and Scalability: Designed to support large-scale deployments with features that ensure system reliability and performance.
  • Cloud and On-Premises Deployment: Provides the flexibility to deploy the solution in the cloud, on-premises, or in a hybrid environment.
Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings

Compare IAM Software

These are the top products most often compared.