Skip to main content

Competitive Advantages

Hitachi ID Password Manager was the first program developed specifically for multi-platform password management. Today, other programs offer some subset of its features, and cover some subset of its platform coverage. Password Manager remains the premiere password management solution, licensed by over

1000 for over 13 million world-wide.

Password Manager compared to other password synchronization products

Password Manager is the leading solution for password synchronization. Password Manager advantages include:

  • Multiple user interfaces:

    Users can continue to manage their password natively and let Password Manager automatically propagate updates. Alternately, users can access a Password Manager web user interface, which is more informative and works well for off-site users as well as those logging into a LAN domain.

  • No manual user profile administration:

    Even when user IDs are different on different systems and there is no reliable correlating data, Password Manager can prompt users to enter and validate their own IDs.

  • No client software deployment:

    Password Manager never requires client software. Native password changes are intercepted on servers, not clients.

  • The widest platform coverage:

    Password Manager includes built-in connectors for most common systems and applications, minimizing the amount of custom code organizations must write to integrate it into their infrastructure.

  • Scalable and robust:

    Password Manager deployments can process peak loads of tens of thousands of password synchronization events per hour. Password Manager works well with load balancers and includes proxy servers to manage distant targets. A built-in queue allows Password Manager to automatically retry password updates when target systems are unresponsive.

Password Manager compared to other password reset products

Password Manager is the leading solution for self-service password reset, PIN reset and intruder unlock. Password Manager advantages include:

  • Accessible anywhere:

    Password Manager is accessible from any web browser -- including smart phones (small browser or voice call). More importantly, password reset is available from the login screen, even when the user is away from the office -- via a combination of WiFi, VPN and ActiveX to reset locally cached passwords.

  • Unlock pre-boot password prompts:

    Users with full disk encryption on their PC normally have to type a password before the OS starts. If they forget this, they require an unlock process that works without a browser or even operating system running. Password Manager includes full disk unlock via telephony self-service.

  • Managed enrollment:

    Self-service is only useful if adopted by users. Users must enroll a profile (security questions, ID mapping, etc.) before they can use the solution, but users rarely volunteer to do so. Password Manager is the only product in this category that includes a managed enrollment feature, to invite, then nag, then (optionally) force users to complete registration. This significantly improves ROI.

  • Client software optional:

    Some organizations do not wish to deploy code to the endpoint. Password Manager supports this with a secure kiosk account and with telephony options. Note that some features, such as password reset for off-site users who have triggered an intruder lockout or forgotten their password, are impossible without client code, however.

  • The most included connectors:

    Password Manager includes built-in connectors for most common systems and applications, minimizing the amount of custom code organizations must write to integrate it into their infrastructure.

  • Fastest deployment:

    Password Manager deployments are typically very short. One of the most impressive deployments to-date was a customer who activated full functionality for 90,000 users with integrations to AD, mainframe and SAP in 5 days.

  • Multi-master architecture:

    Password Manager has no single point of failure. Everything can be replicated across multiple, active servers -- the application, database, connectors, workflows and more.

page top page top