Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Micro Focus Identity Governance


Mitigate Risk, Ensure Compliance and Empower Users to Manage and Certify Access

Work for Micro Focus Identity Governance?

Learning about NetIQ Access Governance Suite?

We can help you find the solution that fits you best.

Micro Focus Identity Governance Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 NetIQ Access Governance Suite review
LinkedIn Connections
NetIQ Access Governance Suite review by David K.
David K.
Validated Reviewer
Review Source

"Use to mange our employee life cycle"

What do you like best?

Very easy to use and to integrate into your system

What do you dislike?

The initial learning curve was a little bigger than i thought.

What business problems are you solving with the product? What benefits have you realized?

Very easy to use and to integrate into your system

Sign in to G2 to see what your connections have to say about Micro Focus Identity Governance

What User Provisioning/Governance solution do you use?

Thanks for letting us know!

There are not enough reviews of Micro Focus Identity Governance for G2 to provide buying insight. Below are some alternatives with more reviews:

ManageEngine ADManager Plus Logo
ManageEngine ADManager Plus
Active Directory Management and Reporting Solution
ManageEngine ADAudit Plus Logo
ManageEngine ADAudit Plus
Real-time Windows Active Directory and File-Server change audit solution
ActivID® Authentication and Credential Management Logo
ActivID® Authentication and Credential Management
HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.
RSA Identity Governance and Lifecycle Logo
RSA Identity Governance and Lifecycle
Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.
Avigilon ACM Logo
Avigilon ACM
Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.
holaSpirit Logo
Holaspirit is a web platform designed for teal organisation, especially Holacracy practitioners.
SMACS by Stack8 is a productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.
Dell Identity Manager Logo
Dell Identity Manager
Identity management solution that automates and streamlines access governance
Office 365 Reports Logo
Office 365 Reports
The software provides more than 200+ reports ready to use without using Powershell scripts. With automated and actionable reports straight to your Desktop, the truly multi-purpose solution offers unsurpassed customization and usability of its report data for collaboration and sharing, ensuring smooth and optimal functioning of your Office 365.
CA Identity Governance Logo
CA Identity Governance
Access certification and identity governance to help meet compliance requirements.
Show more
Kate from G2

Learning about Micro Focus Identity Governance?

I can help.
* We monitor all Micro Focus Identity Governance reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.