IBM Security Identity Governance and Intelligence


IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

Work for IBM Security Identity Governance and Intelligence?

Learning about IBM Security Identity Governance and Intelligence?

We can help you find the solution that fits you best.

IBM Security Identity Governance and Intelligence Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 IBM Security Identity Governance and Intelligence review
LinkedIn Connections
IBM Security Identity Governance and Intelligence review by Vivek M.
Vivek M.
Validated Reviewer
Review Source

"Best product."

What do you like best?

I like this product because it is very simple to use and it has easy user interface and also it has many features which makes the software special and At last it is really helpful and useful product.

What do you dislike?

I dislike this product because of Complexity, and often times requiring customization. Tends to force organization to fit into its way of governance.

Recommendations to others considering the product

I highly recommended this product.

What business problems are you solving with the product? What benefits have you realized?

Really it is helpful and useful product and also makes my work easier with help of its features,Have a good understanding of IGI capabilities and develop a set of requirements before jumping into a full scale development. Start with small, simple flows.

Sign in to G2 to see what your connections have to say about IBM Security Identity Governance and Intelligence

What User Provisioning/Governance solution do you use?

Thanks for letting us know!

There are not enough reviews of IBM Security Identity Governance and Intelligence for G2 to provide buying insight. Below are some alternatives with more reviews:

ManageEngine ADAudit Plus Logo
ManageEngine ADAudit Plus
Real-time Windows Active Directory and File-Server change audit solution
ActivID Authentication and Credential Management Logo
ActivID Authentication and Credential Management
HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.
Avigilon ACM Logo
Avigilon ACM
Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.
RSA Identity Governance and Lifecycle Logo
RSA Identity Governance and Lifecycle
Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.
SMACS by Stack8 is a productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.
holaSpirit Logo
Holaspirit is a web platform designed for teal organisation, especially Holacracy practitioners.
Dell Identity Manager Logo
Dell Identity Manager
Identity management solution that automates and streamlines access governance
Office 365 Reports Logo
Office 365 Reports
The software provides more than 200+ reports ready to use without using Powershell scripts. With automated and actionable reports straight to your Desktop, the truly multi-purpose solution offers unsurpassed customization and usability of its report data for collaboration and sharing, ensuring smooth and optimal functioning of your Office 365.
CA Identity Governance Logo
CA Identity Governance
Access certification and identity governance to help meet compliance requirements.
Symantec Workspace Streaming Logo
Symantec Workspace Streaming
Symantec Workspace Streaming is an application streaming solution used to enable on-demand application provisioning, real-time software license management and instant application upgrades.
Show more
Kate from G2

Learning about IBM Security Identity Governance and Intelligence?

I can help.
* We monitor all IBM Security Identity Governance and Intelligence reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.