Enables organizations to address the business requirements of line-of-business and compliance managers, and auditors to achieve successful implementation

 

Full enterprise-level identity management and governance

IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

 

 

User lifecycle management

Business activity-based approach

Complete user access control

Enable full provisioning and workflow capabilities, leveraging open integration to quickly onboard, manage and simplify Identity Management. Facilitate communication between auditors and IT to help identify risk and highlight segregation of duties violations across enterprise applications including SAP and cloud applications. Gain better visibility and user access control through consolidating access entitlements from applications and employing algorithms for role mining, modeling, optimization and analytics to lower risk.

 

Features of Security Identity Governance and Intelligence

  • Enable certification campaigns
  • Determine segregation of duties violations
  • Consolidate application access entitlements
  • Provide end-to-end user lifecycle management

 

How Security Identity Governance and Intelligence works

 

Enable certification campaigns

IGI enables the business to run campaigns to reconfirm users access needs with a customizable, self-service user dashboard. This simple experience quickly provides flexible and powerful workflow allowing users to easily recertify access.


Consolidate application access entitlements

IGI offers a rich set of mature and compatible application adapters, both on prem and for the cloud. This allows for better visibility and user access control for role mining, modeling and optimization.


Determine segregation of duties violations

IGI uses a business activity-based approach to model segregation of duties violations rather than relying on role-to-role comparison. Business activity is immediately recognizable to the business user and enables a very pure and clear way of showing risk that is understood and actionable. By showing a conflict between business activities, such as “create purchase order” and “approve purchase order,” it is much more obvious to the user than a role-to-role defined conflict.


 

Provide end-to-end user lifecycle management

IGI provides ease of use through lifecycle management capabilities including powerful workflow provisioning and integrated password management. IGI allows sharing of data about users, applications and entitlements.