IBM is a Leader in the Gartner Magic Quadrant for Identity Governance & Administration

Full Enterprise-Level Identity Governance & Administration

Within your organization, you need to be able to understand who has access to what and how that access is being used. Is your identity governance working intelligently? IBM is focused on collecting and analyzing identity data to support enterprise IT and regulatory compliance. With IGI, you’ll improve visibility into how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence. All of this is driven by a business-activity based approach to risk modeling, a major differentiator for IBM that makes life easier for auditors and risk compliance managers.

Increase end-user satisfaction

Enable and streamline full provisioning and self-service requests to quickly onboard, offboard, or manage employees.

Can help achieve regulatory compliance

Eliminate manual efforts on IT audits and provide a more secure environment.

Reduce business risk

Make appropriate access decisions and allow for risk/compliance mangers to quickly identify violations with Separation of Duty (SoD) controls.

Provide insight on risky users

Help identify areas of risk and access optimization, providing priceless visual insights on risky users and behaviors.

Reduce operational costs

Automate labor-intensive processes such as access certifications, access requests, password management and provisioning to dramatically cut operational costs.

Features of Identity Governance and Intelligence (IGI)

  • End-to-end user lifecyle management
  • Access certification
  • Business-activity based approach to model SoD violations
  • Powerful identity analytics
  • Extend ServiceNow catalogue with access management
  • Enhanced password synchronization
  • Integration with privileged account management products
  • Unique SoD controls for SAP
  • Data governance capabilities and GDPR specific controls
  • Integration with QRadar UBA for insider threat management
  • Superior, fine-grained z/OS integration
  • Closed-loop compliance

Product images

Next Steps

Learn more

See how it works