February 26, 2018 By Michael Bunyard 2 min read

IBM Security is again named a Leader in the newly published “Gartner Magic Quadrant for Identity Governance and Administration (IGA).” Not only does this mark four consecutive years that IBM has been evaluated as a Leader in Gartner’s Magic Quadrant for IGA, but IBM believes it demonstrates a significant improvement within the leadership quadrant itself.

IGA Leaders deliver a comprehensive tool set for Identity Governance and Administration needs. Leaders have successfully built a significant installed customer base and revenue stream, and they have high viability ratings and robust revenue growth. Vendors evaluated as Leaders show evidence of superior vision and execution, and typically demonstrate customer satisfaction with IGA capabilities and related service support.

IBM Security Identity Governance & Intelligence (IGI)

IBM Security’s core IGA product is Identity Governance and Intelligence (IGI). IGI ensures that the right people have the right access necessary for their jobs. With IGI you can automate user life cycles, streamline compliance processes and improve the organization’s risk management posture.

A key strength of IGI is its business activity-based approach to model segregation-of-duties (SOD) violations, rather than relying on unmanageable role-to-role comparison. This approach enables business managers to make appropriate access decisions and allow risk and compliance managers to quickly identify SOD violations.

In addition, IGI is natively integrated with ServiceNow, a popular service management tool. This integration provides users of both platforms with one location for all requests. A one-stop shop for all IT-related requests empowers the business with efficiency and provides a very positive digital experience.

IBM’s Commitment to Enterprise Security

Customers all over the world are struggling with too many point products. They are looking for an enterprise security partner who develops solutions and services that are open, integrated and designed to leverage their existing investments. IBM Security will continue to invest heavily in IGA and integrate its capabilities into the broader security immune system as part of our goal to remain the No. 1 enterprise security vendor.

We believe the “Gartner Magic Quadrant for Identity Governance and Administration” is a proof point of IBM Security’s commitment to our customers, of our vision of enterprise security as digital transformation drives investment in the cloud and of our ability to execute in a rapidly evolving marketplace.

Register for your free 45-day trial of IBM Security Identity Governance & Intelligence

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today