Product overview
IBM Verify Identity Governance - previously known as IBM Security Verify Governance - is the newly re-branded next-generation governance solution in the IBM Verify portfolio.
Overview
IBM Verify Identity Governance Version 11.0.0.0 delivers unified identity governance and administration (IGA) capabilities, leveraging the provisioning, governance, and actionable identity risk insights with a potentially lower total cost of ownership and modern user experience.
IVIG core modules
- Lifecycle
-
Enables you to streamline business process, enforce the governance policy for identity lifecycle management, and to automate the provisioning to IT resources.
- Identity Lifecycle Management
- Access Request
- Account and Password Management
- Attribute and Role-Based Policy
- Approval and Fulfillment workflow
- End-to-end change request auditing
- Infrastructure Adapters
- Compliance
-
Enables you to address extensive regulatory and access governance requirements for audit.
- Entitlement Discovery
- Access Certification
- Business activity risk modeling
- Separation of Duty Risk Analysis
- Privileged and Sensitive access risk control
- Compliance Reporting
- Infrastructure Adapters
IVIG add-on modules
- Role Optimization
-
You can create and optimize governance model with better risk awareness and streamline the business process to manage changes.
- Role Analysis Reporting
- Role Mining and Modeling
- Role Lifecycle
- Application Adapters
-
This module includes adapters for account and entitlement synchronization and account provisioning for a wide range of applications on premises and in the cloud.
- Cloud (AWS, Google, Office 365, SharePoint, Box)
- PAM (IBM/CyberArk)
- DAG (Guardium/STEALTHbits)
- ITSM (ServiceNow)
- ERP-CRM(SAP, Oracle, Siebel, Salesforce)
- HRMS (SAP, PeopleSoft)
- Host Adapters
-
This module includes adapters for account and entitlement synchronization and account provisioning for mainframe systems, databases, and applications.
- zSecure
- RACF
- ACF2
- Top-Secret
IVIG Enterprise Edition
The Enterprise Edition includes all of the core modules as well as the add-on modules listed above, in a single Part number for easy pricing and consumption.
Note that Host Adapters are only included in Enterprise PVU license.
Key features
- Operational Visibility Dashboard for identity and access management (IAM) enables administrators to gain better insights into currently running, failed, and successful provisioning and governance operations to address possible remediations.
- Identity Analytics is a multi-purpose analytics engine that processes users and entitlement data from a variety of sources including Verify Identity Governance, providing a 360-degree view of user-entitlement risks with recommendations so that administrators can take action based on the risk insights.
- Modern user experience and business-centric approach of Access Risk Controls help organizations to easily define separation of duties (SoD) and Sensitive Accesses across fine-grain entitlements from provisioning applications.
- Several enhancements with certification campaigns such as user self certification and role entitlement certification that certifies user entitlements to a static role helps organizations to address compliance needs.
- Enhances the Role Optimization capability so that it can be paired with identity governance solutions as well as external roles to perform Role Mining activities.
Salient features
- Lowest TCO
-
Cutting-edge technology offers container deployments, supporting on-premise, RedHat OpenShift, Kubernetes and cloud-native platforms like AWS, Google Cloud Platform.
- Modern User Experience
-
Modernized, secure and customizable user interface that allows admins, end-users, managers, reviewers and helpdesk users to perform their identity related tasks easily.
- Certification Campaigns
-
Mitigate access risks and address compliance by periodically recertifying users, access entitlements and accounts associated with application(s).
- Risk Insights & Operational Visibility
-
Identity Analytics Dashboard for 360-degree view of identity risks to take actions. Operational Visibility Dashboard to track ongoing and past IGA events, activities, failed and successful provisioning operations.
- Role Lifecycle Foundation
-
Enhancement to existing RBAC model to provide visibility into fine-grain entitlements, low-code/no-code for role composition.
- Business Activity Based SoDs
-
Business-centric approach of Separation Of Duty (SoD) policies modeling.
Business activities to present a comprehensive SoD policy and violation view for end-users, managers, auditors and risk compliance managers.
- Role Mining
-
A loosely-coupled application available with Enterprise Edition.
Enhanced Role Optimization capability that can be paired with identity governance solution as well as external roles to perform Role Mining activities.