Published: 06 November 2019
Summary
IGA tools help organizations control access risks, achieve and maintain compliance, and improve efficiency by managing user accounts and entitlements in infrastructure systems and applications. SRM leaders responsible for IAM should evaluate critical capabilities during IGA tool selection.
Included in Full Research
- Critical Capabilities Use-Case Graphics
- Vendors
- Atos (Evidian)
- Broadcom (CA Technologies)
- Hitachi ID Systems
- IBM
- Micro Focus
- Omada
- One Identity
- Oracle
- SailPoint (IdentityIQ)
- SailPoint (IdentityNow)
- SAP
- Saviynt
- Context
- Product/Service Class Definition
- Critical Capabilities Definition
- Identity Life Cycle
- Entitlements Management
- Access Requests
- Workflow
- Policy and Role Management
- Access Certification
- Fulfillment
- Auditing
- Identity Analytics and Reporting
- Ease of Deployment
- Scalability and Performance
- Use Cases
- Global Enterprise
- Midsize Enterprise
- Governance-Focused
- Automation-Focused
- Vendors Added and Dropped
- Critical Capabilities Rating