IBM Security Identity Governance and Intelligence


IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

Work for IBM Security Identity Governance and Intelligence?

Learning about IBM Security Identity Governance and Intelligence?

We can help you find the solution that fits you best.

IBM Security Identity Governance and Intelligence Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 IBM Security Identity Governance and Intelligence review
LinkedIn Connections
IBM Security Identity Governance and Intelligence review by Ruben A.
Ruben A.
Validated Reviewer
Review Source

"Basic Characteristics of IBM Security Identity Governance and Intelligence"

What do you like best?

What I like most about this software is that it offers a business-focused approach to government and identity management, it also facilitates the joint work of IT and business personnel to apply compliance with regulations and meet security objectives. in all business data and applications, it provides management of the life cycle of the business user, evaluation and mitigation of access risk, certification, password management, as well as powerful analytical functions and creation of reports to help make the right decision about Business access. It facilitates the use of all the life cycle management functionalities, including the supply of workflows and the integrated management of passwords, also allows the shared use of user data, applications and entitlements.

What do you dislike?

I have no complaints about this software, only that there may be some technical details, according to software requirements and hardware requirements.

Recommendations to others considering the product

If I recommend it, it allows organizations to address the business requirements of compliance managers and line of business and auditors to get a correct implementation.

What business problems are you solving with the product? What benefits have you realized?

It allowed us to run campaigns to reconfirm the access needs of users with a customizable self-service user control panel, this simple experience provides a powerful and flexible workflow that allows users to easily recertify access, since it uses a Business activity-based approach to create models of breaches of separation of functions, instead of relying on a comparison of functions. Also the benefit was in terms of business activity is immediately associated with the business user, being a clear way to show the risk.

Sign in to G2 Crowd to see what your connections have to say about IBM Security Identity Governance and Intelligence

What User Provisioning/Governance solution do you use?

Thanks for letting us know!

There are not enough reviews of IBM Security Identity Governance and Intelligence for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

ManageEngine ADAudit Plus Logo
ManageEngine ADAudit Plus
Real-time Windows Active Directory and File-Server change audit solution
ManageEngine ADManager Plus Logo
ManageEngine ADManager Plus
Active Directory Management and Reporting Solution
Avigilon ACM Logo
Avigilon ACM
Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.
ActivID® Authentication and Credential Management Logo
ActivID® Authentication and Credential Management
HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.
holaSpirit Logo
Holaspirit is a web platform designed for teal organisation, especially Holacracy practitioners.
RSA Identity Governance and Lifecycle Logo
RSA Identity Governance and Lifecycle
Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.
SMACS by Stack8 is a productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.
Office 365 Reports Logo
Office 365 Reports
The software provides more than 200+ reports ready to use without using Powershell scripts. With automated and actionable reports straight to your Desktop, the truly multi-purpose solution offers unsurpassed customization and usability of its report data for collaboration and sharing, ensuring smooth and optimal functioning of your Office 365.
Dell Identity Manager Logo
Dell Identity Manager
Identity management solution that automates and streamlines access governance
Micro Focus Identity Governance Logo
Micro Focus Identity Governance
Mitigate Risk, Ensure Compliance and Empower Users to Manage and Certify Access
Show more
Kate from G2 Crowd

Learning about IBM Security Identity Governance and Intelligence?

I can help.
* We monitor all IBM Security Identity Governance and Intelligence reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.