IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.
What I like most about this software is that it offers a business-focused approach to government and identity management, it also facilitates the joint work of IT and business personnel to apply compliance with regulations and meet security objectives. in all business data and applications, it provides management of the life cycle of the business user, evaluation and mitigation of access risk, certification, password management, as well as powerful analytical functions and creation of reports to help make the right decision about Business access. It facilitates the use of all the life cycle management functionalities, including the supply of workflows and the integrated management of passwords, also allows the shared use of user data, applications and entitlements.
What do you dislike?
I have no complaints about this software, only that there may be some technical details, according to software requirements and hardware requirements.
Recommendations to others considering the product
If I recommend it, it allows organizations to address the business requirements of compliance managers and line of business and auditors to get a correct implementation.
What business problems are you solving with the product? What benefits have you realized?
It allowed us to run campaigns to reconfirm the access needs of users with a customizable self-service user control panel, this simple experience provides a powerful and flexible workflow that allows users to easily recertify access, since it uses a Business activity-based approach to create models of breaches of separation of functions, instead of relying on a comparison of functions. Also the benefit was in terms of business activity is immediately associated with the business user, being a clear way to show the risk.
* We monitor all IBM Security Identity Governance and Intelligence reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.