IBM Identity Governance and Intelligence Benefits

Provide end-to-end user lifecycle management

IGI provides ease of use by bridging lifecycle management capabilities including powerful role management, multilevel provisioning workflow and integrated password management.

Enable certification campaigns

IGI enables the business to run campaigns to reconfirm users access needs with a customizable, self-service user dashboard. This simple experience quickly provides flexible and powerful workflow allowing users to easily recertify access.

Determine segregation of duties violations

IGI uses a unique business activity-based approach to model segregation of duties violations rather than relying on unmanageable role-to-role comparison. Business activity is immediately readable to the business user and enables a very clear way of showing risk that is both understandable and actionable.

Provide identity analytics and insider threat management

IGI offers a rich set of mature and compatible application adapters, both on-prem and for the cloud. This allows for better visibility and user access control for role mining, modeling and optimization.

IBM was named a Leader in Gartner’s 2018 Magic Quadrant

Read the analyst report

How customers use it

  • Ensure users have proper access to apps and systems


    Traditional identity systems with complex roles and IT entitlements often left business users in the dark when identity management is handled only by the IT department.


    IBM Security Identity Governance and Intelligence uses business-centric activity data to help end users and line of business managers understand the nature of the access they are requesting and certifying to ensure users have proper access.

  • Line of business owner managing access for his team


    Line of business owners need to have effective tools to manage user access to IT resources.


    IGI provides a business friendly user interface to help line of business owners request, review and approve access for team members and automate end-to-end provisioning for user's access to Servers, Applications and Database systems.

  • Automated risk mitigation based on user activity analysis


    IT systems need to detect malicious user activity and respond quickly to prevent and contain insider threats.


    When anomalous user behavior is detected by QRadar/UBA, the user's accounts are suspended in IGI, and an orchestration of the offense is initiated to engage the user via IBM Verify to mitigate the risk and follow up with proper actions.

Technical details

Software requirements

Software requirements for IBM Security Identity Governance and Intelligence can be viewed at:

    Hardware requirements

    Hardware requirements for IBM Security Identity Governance and Intelligence can be viewed at:

      See how it works