• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Application Integration Platforms
      • Code Modernization Tools
      • Event Brokers
      • Virtual Reality Development Software
      • Digital Twin of an Organization Platforms
      • Green Software Engineering
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • AI Agent Development Platforms for Software Engineering
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Identity Governance and Administration

Identity Governance and Administration Reviews and Ratings

What are Identity Governance and Administration?

Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of NEXIS 4
NEXIS 4
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Pathlock
Pathlock
For 50M-1B USD Companies
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of Identity Security Cloud
Identity Security Cloud
Logo of Oracle Identity Governance
Oracle Identity Governance
For North America
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of Saviynt Identity Cloud
Saviynt Identity Cloud
Integration & Deployment
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Microsoft Entra ID
Microsoft Entra ID

Product Listings

Filter by

Products 1 - 20 of 115
Sort by
Logo of Identity Security Cloud

Identity Security Cloud

By SailPoint

4.8
(800 Ratings)
customers choice 2024

Identity Security Cloud is a software designed to help organizations manage and secure digital identities across various systems and applications. The software provides automated identity lifecycle management, access controls, and compliance features to enable organizations to streamline user provisioning and deprovisioning, enforce access policies, and monitor user activities. Identity Security Cloud integrates with a range of business applications and infrastructure, supporting secure single sign-on, password management, and risk-based access decisions. The software addresses business requirements for mitigating identity-related security risks, maintaining regulatory compliance, and improving operational efficiency by centralizing identity governance and administration.

Show More Details
Logo of Saviynt Identity Cloud

Saviynt Identity Cloud

By Saviynt

4.8
(393 Ratings)
customers choice 2024

Saviynt Identity Cloud is a software that provides identity governance and administration capabilities for organizations. The software enables enterprises to manage user identities, access, and entitlements across cloud, hybrid, and on-premises environments. It offers features including automated provisioning and deprovisioning, access requests, risk-based access reviews, compliance reporting, and integration with a range of applications and systems. The software addresses business challenges related to security, compliance, and risk by ensuring that only authorized users have appropriate access to critical resources and data while supporting regulatory requirements and audit readiness.

Show More Details
Logo of ManageEngine ADManager Plus

ManageEngine ADManager Plus

By ManageEngine

4.5
(384 Ratings)

ManageEngine ADManager Plus is a software designed for Active Directory management and reporting. It enables IT administrators to automate user provisioning and de-provisioning tasks, manage groups, computers, and other directory objects, and create predefined reports on users, security groups, and permissions. The software provides role-based access control and workflow management to streamline operations and maintain compliance with organizational policies. ADManager Plus addresses business needs related to user lifecycle management, audit readiness, and ensuring security across Windows networks by simplifying routine tasks and minimizing the risk associated with manual processes.

Show More Details
Logo of Oracle Identity Governance

Oracle Identity Governance

By Oracle

4.7
(348 Ratings)
customers choice 2024

Oracle Identity Governance is a software designed to manage user identities and access across enterprise environments. It provides functionalities for automating provisioning, managing the lifecycle of identities, conducting certification and compliance, and handling access requests. The software addresses business needs related to regulatory compliance and risk management by helping organizations ensure that access to systems and data is appropriately controlled and auditable. Oracle Identity Governance integrates with a range of applications and systems to deliver centralized identity administration and offers self-service features, workflow customization, and reporting tools to support governance processes.

Show More Details
Logo of ManageEngine AD360

ManageEngine AD360

By ManageEngine

4.6
(256 Ratings)

ManageEngine AD360 is an identity and access management software designed to streamline user lifecycle management, access governance, and security administration in Windows Active Directory, Microsoft 365, and other enterprise applications. The software features tools for user provisioning and de-provisioning, password management, access controls, and compliance audits. It automates routine administrative tasks and provides reporting to support organizational security and regulatory requirements. AD360 assists businesses in managing user identities efficiently, enhancing authentication workflows, and meeting policy standards for data protection and access.

Show More Details
Logo of Okta Lifecycle Management

Okta Lifecycle Management

By Okta

4.6
(212 Ratings)

Okta Lifecycle Management is a software designed to automate the onboarding and offboarding of users, streamline the provisioning and deprovisioning of access to applications, and manage user identities within organizations. The software enables centralized control over user account creation, updates, and termination across various systems, ensuring that users have appropriate access based on their roles. Okta Lifecycle Management supports integrations with multiple directories and cloud applications, enforces security policies, and helps maintain compliance by providing detailed audit trails. This software addresses the challenge of manual identity management processes, reducing the risk of errors and unauthorized access, and assisting organizations in increasing operational efficiency and security during user transitions.

Show More Details
Logo of One Identity Manager

One Identity Manager

By One Identity

4.3
(179 Ratings)

One Identity Manager is an identity and access management software designed to help organizations manage user identities, entitlements, and security policies across diverse IT environments. The software enables automation of account creation, modification, and removal, as well as governance over access privileges and compliance with regulatory requirements. It provides capabilities for role-based access control, workflow-driven provisioning, and auditing to help organizations reduce risk and maintain consistent business processes. By centralizing identity lifecycle management and integrating with various applications and directories, the software addresses operational efficiency and security challenges related to user access in complex enterprise infrastructures.

Show More Details
Logo of Omada Identity

Omada Identity

By Omada

4.6
(142 Ratings)

Omada Identity is a software focused on identity governance and administration, providing organizations with tools to manage user access and permissions across systems and applications. The software automates user lifecycle processes, including onboarding, role assignment, and deprovisioning, to enhance security and enable regulatory compliance. It offers features such as role-based access control, workflow automation, policy enforcement, and reporting to address business challenges related to mitigating access risks and ensuring that access rights are aligned with organizational policies. The software aims to help organizations reduce manual work, prevent unauthorized access, and facilitate audits by offering a centralized platform for identity management and access reviews.

Show More Details
Logo of RadiantOne Identity Data Platform

RadiantOne Identity Data Platform

By Radiant Logic

4.8
(117 Ratings)

RadiantOne Identity Data Platform is a software designed to unify and manage identity data across diverse systems and sources within an organization. The software integrates identity information from directories, databases, and cloud platforms, providing a centralized view for identity governance and access management. It enables organizations to streamline authentication and authorization processes by consolidating fragmented identity silos, supporting identity synchronization and virtualization. RadiantOne Identity Data Platform aims to address business challenges related to identity complexity, compliance, and security by enhancing the consistency and reliability of identity data for applications and services, facilitating interoperability and scalability for identity-driven initiatives.

Show More Details
Logo of IBM Security Verify Governance

IBM Security Verify Governance

By IBM

3.8
(110 Ratings)

IBM Security Verify Governance is a software designed to manage identity governance and administration within organizations. It provides capabilities for access certification, role management, policy enforcement, and segregation of duties. The software enables businesses to automate user access and entitlement reviews, ensuring that appropriate access rights are granted and maintained in accordance with organizational policies. Through integration with various applications and systems, it supports regulatory compliance and internal security requirements by monitoring and reporting on user activities and access risks. IBM Security Verify Governance addresses the need for consistent and auditable control over digital identities, facilitating secure access while minimizing operational risk.

Show More Details
Logo of Microsoft Entra ID

Microsoft Entra ID

By Microsoft

4.4
(101 Ratings)

Microsoft Entra ID is an identity and access management software designed to help organizations securely manage user identities and control access to applications and resources. The software offers features such as single sign-on, multifactor authentication, and conditional access policies to facilitate secure authentication and authorization processes. Entra ID enables centralized administration of users, groups, and devices, supporting hybrid environments with integration across cloud-based and on-premises applications. It addresses the business need for secure access management by providing tools for identity governance, monitoring, and reporting on user activities. The software helps organizations reduce security risks associated with unauthorized access and streamlines user lifecycle management.

Show More Details
Logo of RSA Governance & Lifecycle

RSA Governance & Lifecycle

By RSA

4.3
(95 Ratings)

RSA Governance & Lifecycle is a software designed to manage identity and access governance within organizations. The software offers features for automating user access requests, policy management, and compliance reporting. It enables centralized administration of user identities, streamlines approval workflows, and delivers tools for detecting and mitigating access-related risks. RSA Governance & Lifecycle supports integration with various enterprise applications and systems to facilitate seamless provisioning and de-provisioning of access. The software helps organizations address regulatory requirements by providing audit trails and enforcement of security controls, aiming to reduce manual processes and enhance oversight across identity management functions.

Show More Details
Logo of Netwrix Directory Manager

Netwrix Directory Manager

By Netwrix

4.6
(87 Ratings)

Netwrix Directory Manager is a directory management solution that automates and delegates user, group, and access lifecycle tasks across Active Directory, Microsoft Entra ID, and Google Workspace. It enables organizations to streamline provisioning, deprovisioning, and modification processes, enforce least privilege with time-bound access, and maintain directory hygiene with lifecycle policies and attestation. Workflow-driven delegation allows non-IT staff to manage requests securely while maintaining centralized oversight. The solution integrates with ITSM tools and supports self-service password reset, Microsoft Teams governance, and application provisioning. Built-in auditing, reporting, and policy enforcement help reduce risk, improve efficiency, and support compliance.

Show More Details
Logo of Symantec IGA

Symantec IGA

By Broadcom

4.2
(84 Ratings)

Symantec IGA is a software designed to manage identity governance and administration for organizations. The software provides capabilities for automating user provisioning, managing access rights, and enforcing security policies across various IT systems. It supports integration with different applications, directories, and platforms, enabling centralized control over user identities and entitlements. Symantec IGA addresses compliance requirements by providing tools for policy enforcement, access certification, and audit reporting. The software aims to reduce manual processes associated with identity management and helps minimize security risks by ensuring that users have appropriate access based on their roles and responsibilities within the organization.

Show More Details
Logo of SAP Access Control

SAP Access Control

By SAP

4.4
(83 Ratings)

SAP Access Control is a software designed to help organizations manage and monitor user access across enterprise systems. The software features automated access risk analysis, role management, and compliant provisioning to reduce unauthorized access and segregation of duties conflicts. It facilitates policy enforcement through workflow-based approval processes and periodic access review cycles. SAP Access Control also integrates with identity management solutions to streamline user provisioning and deprovisioning. This software assists businesses in meeting governance and compliance requirements by enabling detailed audit trails and continuous monitoring of access-related activities, helping address regulatory demands and internal policies associated with access governance.

Show More Details
Logo of Saviynt Application Access Governance

Saviynt Application Access Governance

By Saviynt

4.9
(81 Ratings)
customers choice 2024

Saviynt Application Access Governance software provides organizations with the capability to manage and secure user access to applications across enterprise environments. The software enables automated provisioning and deprovisioning of user accounts, continuous monitoring of user entitlements, and enforcement of access policies. It integrates with various on-premises and cloud applications, allowing centralized oversight of application access and adherence to compliance requirements. The software supports risk-based access controls, helping organizations identify and remediate inappropriate permissions, reduce potential security threats from excessive access, and facilitate audits. Its reporting features assist in demonstrating policy compliance and access history for governance purposes.

Show More Details
Logo of Omada Identity Cloud

Omada Identity Cloud

By Omada

4.6
(76 Ratings)

Omada Identity Cloud is a software designed to manage identity governance and administration for organizations. The software provides features for automating user provisioning, access certification, and role management. It enables organizations to enforce policies related to user access rights and supports compliance with regulatory requirements. Omada Identity Cloud integrates with various IT systems to centralize identity lifecycle management, reduce manual processes, and help minimize the risk of unauthorized access. The software offers analytics and reporting tools to support audit and decision-making processes, aiming to address challenges related to access control and identity management across complex enterprise environments.

Show More Details
Logo of OpenText Identity Manager (NetIQ)

OpenText Identity Manager (NetIQ)

By OpenText

4
(74 Ratings)

OpenText Identity Manager software provides identity management capabilities that automate user provisioning, access management, and identity lifecycle processes across diverse IT environments. The software enables organizations to centrally manage user identities, access permissions, and policy enforcement, helping streamline administrative tasks and maintain compliance with regulatory requirements. It facilitates integration with a variety of systems, applications, and directories, supports role-based access controls, and offers workflows for request and approval management. OpenText Identity Manager addresses the business need for secure and efficient management of digital identities, reducing manual effort, and supporting organizations in ensuring that the right individuals have appropriate access to resources throughout the user lifecycle.

Show More Details
Logo of Pathlock

Pathlock

By Pathlock

4.6
(57 Ratings)

Pathlock Cloud provides fine-grained identity security and governance for business-critical applications, helping organizations reduce risk, lower compliance costs, and maintain audit and IPO readiness.

It enables organizations to quickly implement controls, analytics, and automated workflows to ensure comprehensive, granular, and efficient compliance across their diverse application landscape.

Supporting over 140 applications, Pathlock Cloud allows businesses to manage all aspects of application governance from a single platform—including user provisioning and temporary access elevation, continuous user access reviews, risk analysis, control testing, transaction monitoring, and audit preparation.

Show More Details
Logo of Lumos Next-Gen IGA

Lumos Next-Gen IGA

By Lumos

4.7
(54 Ratings)

Lumos Next-Gen IGA is an identity governance and administration software designed to help organizations manage user access and entitlements across various applications and systems. The software provides features such as automated provisioning and deprovisioning of users, access reviews, policy management, and compliance reporting. It enables organizations to enforce security policies, maintain regulatory compliance, and reduce the risk of unauthorized access by ensuring that users have appropriate permissions aligned with their roles. The software supports integration with cloud and on-premises applications, offering centralized visibility into user identities and access activities, assisting in streamlining identity lifecycle management and improving audit readiness.

Show More Details

Features of Identity Governance and Administration

Updated November 2025

Mandatory Features:

  • Identity life cycle management and identity data integration (including with multiple sources)

  • Entitlement management and data integration (e.g., discovery, entitlement catalog management, and entitlement data enrichment, including descriptions, owners and sensitivity ratings)

  • Policy and role management

  • Auditing, reporting and basic analytics (descriptive and diagnostic analytics), including risk scoring

  • Provisioning via automated connectors (including some options for apps that don’t use System for Cross-Domain Identity Management [SCIM]) and via integration to IT service management (ITSM)/ticketing systems to trigger manual fulfillment flows

  • Access certification (also called attestation or review)

  • Access request processing and workflow orchestration

Peer Lessons Learned for Identity Governance and Administration

Published February 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Identity Governance and AdministrationLessons learned by your peers shared on Gartner Peer Insights for Identity Governance and AdministrationPeer Lessons Learned for Identity Governance andAdministrationLesson 1LESSON1Involve Business and IT Security Teams toOutline Requirements for an IGA SolutionLesson 2LESSON2Perform POCs to Detect Limitations andValidate Capabilities of IGA SolutionsLesson 3LESSON3Remove Data Gaps and Legacy Issues;Standardize IGA Policies and ProcessesLesson 4LESSON4Adhere to Standard Configurations; HireSpecialists for Rolling Out the IGA SolutionLesson 5LESSON5Coach Team Members to Ensure OptimalUtilization of the IGA Solutionn = 380Source: Reviews (380) submitted to Gartner Peer InsightsID: 6222287Gartner ®
Read Full Insights

Gartner Research

Market Guide for Identity Governance and Administration
Gartner Peer Insights 'Voice of the Customer': Identity Governance and Administration

Top Trending Products

One Identity ManagerManageEngine ADManager PlusManageEngine AD360Identity Security CloudOracle Identity GovernanceSaviynt Identity CloudMicrosoft Entra IDPathlockCayosoft AdministratorZluri

Popular Product Comparisons

Identity Security Cloud vs Saviynt Identity Cloud

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.