IBM Security is again named a Leader in the newly published “Gartner Magic Quadrant for Identity Governance and Administration (IGA).” Not only does this mark four consecutive years that IBM has been evaluated as a Leader in Gartner’s Magic Quadrant for IGA, but IBM believes it demonstrates a significant improvement within the leadership quadrant itself.

IGA Leaders deliver a comprehensive tool set for Identity Governance and Administration needs. Leaders have successfully built a significant installed customer base and revenue stream, and they have high viability ratings and robust revenue growth. Vendors evaluated as Leaders show evidence of superior vision and execution, and typically demonstrate customer satisfaction with IGA capabilities and related service support.

IBM Security Identity Governance & Intelligence (IGI)

IBM Security’s core IGA product is Identity Governance and Intelligence (IGI). IGI ensures that the right people have the right access necessary for their jobs. With IGI you can automate user life cycles, streamline compliance processes and improve the organization’s risk management posture.

A key strength of IGI is its business activity-based approach to model segregation-of-duties (SOD) violations, rather than relying on unmanageable role-to-role comparison. This approach enables business managers to make appropriate access decisions and allow risk and compliance managers to quickly identify SOD violations.

In addition, IGI is natively integrated with ServiceNow, a popular service management tool. This integration provides users of both platforms with one location for all requests. A one-stop shop for all IT-related requests empowers the business with efficiency and provides a very positive digital experience.

IBM’s Commitment to Enterprise Security

Customers all over the world are struggling with too many point products. They are looking for an enterprise security partner who develops solutions and services that are open, integrated and designed to leverage their existing investments. IBM Security will continue to invest heavily in IGA and integrate its capabilities into the broader security immune system as part of our goal to remain the No. 1 enterprise security vendor.

We believe the “Gartner Magic Quadrant for Identity Governance and Administration” is a proof point of IBM Security’s commitment to our customers, of our vision of enterprise security as digital transformation drives investment in the cloud and of our ability to execute in a rapidly evolving marketplace.

Register for your free 45-day trial of IBM Security Identity Governance & Intelligence

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…