• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

Best Identity Governance and Administration Reviews 2026 | Gartner Peer Insights
Highest Rated By Your Peers
For Willingness to Recommend
Logo of NEXIS 4
NEXIS 4
Logo of Pathlock
Pathlock
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
For 50M-1B USD Companies
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of Identity Security Cloud
Identity Security Cloud
Logo of Oracle Identity Governance
Oracle Identity Governance
For North America
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of Saviynt Identity Cloud
Saviynt Identity Cloud
Integration & Deployment
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Microsoft Entra ID
Microsoft Entra ID

What are Identity Governance and Administration?

Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access.

Learn More About This Category
How Categories and Markets Are Defined
All Categories
/
Identity Governance and Administration

Identity Governance and Administration Reviews and Ratings

Features of Identity Governance and Administration

Updated November 2025

Mandatory Features:

  • Identity life cycle management and identity data integration (including with multiple sources)

  • Entitlement management and data integration (e.g., discovery, entitlement catalog management, and entitlement data enrichment, including descriptions, owners and sensitivity ratings)

  • Policy and role management

  • Auditing, reporting and basic analytics (descriptive and diagnostic analytics), including risk scoring

  • Provisioning via automated connectors (including some options for apps that don’t use System for Cross-Domain Identity Management [SCIM]) and via integration to IT service management (ITSM)/ticketing systems to trigger manual fulfillment flows

  • Access certification (also called attestation or review)

  • Access request processing and workflow orchestration

Peer Lessons Learned for Identity Governance and Administration

Published February 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Identity Governance and AdministrationLessons learned by your peers shared on Gartner Peer Insights for Identity Governance and AdministrationPeer Lessons Learned for Identity Governance andAdministrationLesson 1LESSON1Involve Business and IT Security Teams toOutline Requirements for an IGA SolutionLesson 2LESSON2Perform POCs to Detect Limitations andValidate Capabilities of IGA SolutionsLesson 3LESSON3Remove Data Gaps and Legacy Issues;Standardize IGA Policies and ProcessesLesson 4LESSON4Adhere to Standard Configurations; HireSpecialists for Rolling Out the IGA SolutionLesson 5
Read Full Insights

Gartner Client Insights

Market Guide for Identity Governance and Administration
Gartner Peer Insights 'Voice of the Customer': Identity Governance and Administration

Top Trending Products

ManageEngine AD360ManageEngine ADManager PlusToriiIdentity Security CloudMicrosoft Entra IDAppsian Security PlatformZluriCloudEagleOne Identity ManagerAccess Auditor

Popular Product Comparisons

Identity Security Cloud vs Saviynt Identity Cloud

LESSON5Coach Team Members to Ensure OptimalUtilization of the IGA Solutionn = 380Source: Reviews (380) submitted to Gartner Peer InsightsID: 6222287Gartner ®

Product Listings

Filter by

Products 1 - 20 of 114
Sort by
Logo of Identity Security Cloud

Identity Security Cloud

By SailPoint

4.8
(802 Ratings)
customers choice 2026

Identity Security Cloud is a software designed to help organizations manage and secure digital identities across various systems and applications. The software provides automated identity lifecycle management, access controls, and compliance features to enable organizations to streamline user provisioning and deprovisioning, enforce access policies, and monitor user activities. Identity Security Cloud integrates with a range of business applications and infrastructure, supporting secure single sign-on, password management, and risk-based access decisions. The software addresses business requirements for mitigating identity-related security risks, maintaining regulatory compliance, and improving operational efficiency by centralizing identity governance and administration.

Show More Details
Logo of ManageEngine ADManager Plus

ManageEngine ADManager Plus

By ManageEngine

4.6
(400 Ratings)

ManageEngine ADManager Plus is a software designed for Active Directory management and reporting. It enables IT administrators to automate user provisioning and de-provisioning tasks, manage groups, computers, and other directory objects, and create predefined reports on users, security groups, and permissions. The software provides role-based access control and workflow management to streamline operations and maintain compliance with organizational policies. ADManager Plus addresses business needs related to user lifecycle management, audit readiness, and ensuring security across Windows networks by simplifying routine tasks and minimizing the risk associated with manual processes.

Show More Details
Logo of Saviynt Identity Cloud

Saviynt Identity Cloud

By Saviynt

4.8
(393 Ratings)
customers choice 2026

Saviynt Identity Cloud is a software that provides identity governance and administration capabilities for organizations. The software enables enterprises to manage user identities, access, and entitlements across cloud, hybrid, and on-premises environments. It offers features including automated provisioning and deprovisioning, access requests, risk-based access reviews, compliance reporting, and integration with a range of applications and systems. The software addresses business challenges related to security, compliance, and risk by ensuring that only authorized users have appropriate access to critical resources and data while supporting regulatory requirements and audit readiness.

Show More Details
Logo of Oracle Identity Governance

Oracle Identity Governance

By Oracle

4.7
(348 Ratings)

Oracle Identity Governance is a software designed to manage user identities and access across enterprise environments. It provides functionalities for automating provisioning, managing the lifecycle of identities, conducting certification and compliance, and handling access requests. The software addresses business needs related to regulatory compliance and risk management by helping organizations ensure that access to systems and data is appropriately controlled and auditable. Oracle Identity Governance integrates with a range of applications and systems to deliver centralized identity administration and offers self-service features, workflow customization, and reporting tools to support governance processes.

Show More Details
Logo of ManageEngine AD360

ManageEngine AD360

By ManageEngine

4.6
(275 Ratings)

ManageEngine AD360 is an identity and access management software designed to streamline user lifecycle management, access governance, and security administration in Windows Active Directory, Microsoft 365, and other enterprise applications. The software features tools for user provisioning and de-provisioning, password management, access controls, and compliance audits. It automates routine administrative tasks and provides reporting to support organizational security and regulatory requirements. AD360 assists businesses in managing user identities efficiently, enhancing authentication workflows, and meeting policy standards for data protection and access.

Show More Details
Logo of Okta Lifecycle Management

Okta Lifecycle Management

By Okta

4.6
(212 Ratings)

Okta Lifecycle Management is a software designed to automate the onboarding and offboarding of users, streamline the provisioning and deprovisioning of access to applications, and manage user identities within organizations. The software enables centralized control over user account creation, updates, and termination across various systems, ensuring that users have appropriate access based on their roles. Okta Lifecycle Management supports integrations with multiple directories and cloud applications, enforces security policies, and helps maintain compliance by providing detailed audit trails. This software addresses the challenge of manual identity management processes, reducing the risk of errors and unauthorized access, and assisting organizations in increasing operational efficiency and security during user transitions.

Show More Details
Logo of One Identity Manager

One Identity Manager

By One Identity

4.3
(183 Ratings)

One Identity Manager is an identity and access management software designed to help organizations manage user identities, entitlements, and security policies across diverse IT environments. The software enables automation of account creation, modification, and removal, as well as governance over access privileges and compliance with regulatory requirements. It provides capabilities for role-based access control, workflow-driven provisioning, and auditing to help organizations reduce risk and maintain consistent business processes. By centralizing identity lifecycle management and integrating with various applications and directories, the software addresses operational efficiency and security challenges related to user access in complex enterprise infrastructures.

Show More Details
Logo of Omada Identity

Omada Identity

By Omada

4.6
(142 Ratings)

Omada Identity is a software focused on identity governance and administration, providing organizations with tools to manage user access and permissions across systems and applications. The software automates user lifecycle processes, including onboarding, role assignment, and deprovisioning, to enhance security and enable regulatory compliance. It offers features such as role-based access control, workflow automation, policy enforcement, and reporting to address business challenges related to mitigating access risks and ensuring that access rights are aligned with organizational policies. The software aims to help organizations reduce manual work, prevent unauthorized access, and facilitate audits by offering a centralized platform for identity management and access reviews.

Show More Details
Logo of RadiantOne Identity Data Platform

RadiantOne Identity Data Platform

By Radiant Logic

4.8
(117 Ratings)

RadiantOne Identity Data Platform is a software designed to unify and manage identity data across diverse systems and sources within an organization. The software integrates identity information from directories, databases, and cloud platforms, providing a centralized view for identity governance and access management. It enables organizations to streamline authentication and authorization processes by consolidating fragmented identity silos, supporting identity synchronization and virtualization. RadiantOne Identity Data Platform aims to address business challenges related to identity complexity, compliance, and security by enhancing the consistency and reliability of identity data for applications and services, facilitating interoperability and scalability for identity-driven initiatives.

Show More Details
Logo of IBM Security Verify Governance

IBM Security Verify Governance

By IBM

3.8
(109 Ratings)

IBM Security Verify Governance is a software designed to manage identity governance and administration within organizations. It provides capabilities for access certification, role management, policy enforcement, and segregation of duties. The software enables businesses to automate user access and entitlement reviews, ensuring that appropriate access rights are granted and maintained in accordance with organizational policies. Through integration with various applications and systems, it supports regulatory compliance and internal security requirements by monitoring and reporting on user activities and access risks. IBM Security Verify Governance addresses the need for consistent and auditable control over digital identities, facilitating secure access while minimizing operational risk.

Show More Details
Logo of Microsoft Entra ID

Microsoft Entra ID

By Microsoft

4.4
(104 Ratings)

Microsoft Entra ID is an identity and access management software designed to help organizations securely manage user identities and control access to applications and resources. The software offers features such as single sign-on, multifactor authentication, and conditional access policies to facilitate secure authentication and authorization processes. Entra ID enables centralized administration of users, groups, and devices, supporting hybrid environments with integration across cloud-based and on-premises applications. It addresses the business need for secure access management by providing tools for identity governance, monitoring, and reporting on user activities. The software helps organizations reduce security risks associated with unauthorized access and streamlines user lifecycle management.

Show More Details
Logo of RSA Governance & Lifecycle

RSA Governance & Lifecycle

By RSA

4.3
(95 Ratings)

RSA Governance & Lifecycle is a software designed to manage identity and access governance within organizations. The software offers features for automating user access requests, policy management, and compliance reporting. It enables centralized administration of user identities, streamlines approval workflows, and delivers tools for detecting and mitigating access-related risks. RSA Governance & Lifecycle supports integration with various enterprise applications and systems to facilitate seamless provisioning and de-provisioning of access. The software helps organizations address regulatory requirements by providing audit trails and enforcement of security controls, aiming to reduce manual processes and enhance oversight across identity management functions.

Show More Details
Logo of Netwrix Directory Manager

Netwrix Directory Manager

By Netwrix

4.6
(87 Ratings)

Netwrix Directory Manager is a directory management solution that automates and delegates user, group, and access lifecycle tasks across Active Directory, Microsoft Entra ID, and Google Workspace. It enables organizations to streamline provisioning, deprovisioning, and modification processes, enforce least privilege with time-bound access, and maintain directory hygiene with lifecycle policies and attestation. Workflow-driven delegation allows non-IT staff to manage requests securely while maintaining centralized oversight. The solution integrates with ITSM tools and supports self-service password reset, Microsoft Teams governance, and application provisioning. Built-in auditing, reporting, and policy enforcement help reduce risk, improve efficiency, and support compliance.

Show More Details
Logo of Symantec IGA

Symantec IGA

By Broadcom

4.2
(84 Ratings)

Symantec IGA is a software designed to manage identity governance and administration for organizations. The software provides capabilities for automating user provisioning, managing access rights, and enforcing security policies across various IT systems. It supports integration with different applications, directories, and platforms, enabling centralized control over user identities and entitlements. Symantec IGA addresses compliance requirements by providing tools for policy enforcement, access certification, and audit reporting. The software aims to reduce manual processes associated with identity management and helps minimize security risks by ensuring that users have appropriate access based on their roles and responsibilities within the organization.

Show More Details
Logo of SAP Access Control

SAP Access Control

By SAP

4.4
(83 Ratings)

SAP Access Control is a software designed to help organizations manage and monitor user access across enterprise systems. The software features automated access risk analysis, role management, and compliant provisioning to reduce unauthorized access and segregation of duties conflicts. It facilitates policy enforcement through workflow-based approval processes and periodic access review cycles. SAP Access Control also integrates with identity management solutions to streamline user provisioning and deprovisioning. This software assists businesses in meeting governance and compliance requirements by enabling detailed audit trails and continuous monitoring of access-related activities, helping address regulatory demands and internal policies associated with access governance.

Show More Details
Logo of Saviynt Application Access Governance

Saviynt Application Access Governance

By Saviynt

4.9
(81 Ratings)
customers choice 2026

Saviynt Application Access Governance software provides organizations with the capability to manage and secure user access to applications across enterprise environments. The software enables automated provisioning and deprovisioning of user accounts, continuous monitoring of user entitlements, and enforcement of access policies. It integrates with various on-premises and cloud applications, allowing centralized oversight of application access and adherence to compliance requirements. The software supports risk-based access controls, helping organizations identify and remediate inappropriate permissions, reduce potential security threats from excessive access, and facilitate audits. Its reporting features assist in demonstrating policy compliance and access history for governance purposes.

Show More Details
Logo of Omada Identity Cloud

Omada Identity Cloud

By Omada

4.6
(76 Ratings)

Omada Identity Cloud is a software designed to manage identity governance and administration for organizations. The software provides features for automating user provisioning, access certification, and role management. It enables organizations to enforce policies related to user access rights and supports compliance with regulatory requirements. Omada Identity Cloud integrates with various IT systems to centralize identity lifecycle management, reduce manual processes, and help minimize the risk of unauthorized access. The software offers analytics and reporting tools to support audit and decision-making processes, aiming to address challenges related to access control and identity management across complex enterprise environments.

Show More Details
Logo of OpenText Identity Manager (NetIQ)

OpenText Identity Manager (NetIQ)

By OpenText

4
(74 Ratings)

OpenText Identity Manager software provides identity management capabilities that automate user provisioning, access management, and identity lifecycle processes across diverse IT environments. The software enables organizations to centrally manage user identities, access permissions, and policy enforcement, helping streamline administrative tasks and maintain compliance with regulatory requirements. It facilitates integration with a variety of systems, applications, and directories, supports role-based access controls, and offers workflows for request and approval management. OpenText Identity Manager addresses the business need for secure and efficient management of digital identities, reducing manual effort, and supporting organizations in ensuring that the right individuals have appropriate access to resources throughout the user lifecycle.

Show More Details
Logo of Pathlock

Pathlock

By Pathlock

4.6
(59 Ratings)

Pathlock Cloud provides fine-grained identity security and governance for business-critical applications, helping organizations reduce risk, lower compliance costs, and maintain audit and IPO readiness.

It enables organizations to quickly implement controls, analytics, and automated workflows to ensure comprehensive, granular, and efficient compliance across their diverse application landscape.

Supporting over 140 applications, Pathlock Cloud allows businesses to manage all aspects of application governance from a single platform—including user provisioning and temporary access elevation, continuous user access reviews, risk analysis, control testing, transaction monitoring, and audit preparation.

Show More Details
Logo of Lumos Next-Gen IGA

Lumos Next-Gen IGA

By Lumos

4.7
(54 Ratings)

Lumos Next-Gen IGA is an identity governance and administration software designed to help organizations manage user access and entitlements across various applications and systems. The software provides features such as automated provisioning and deprovisioning of users, access reviews, policy management, and compliance reporting. It enables organizations to enforce security policies, maintain regulatory compliance, and reduce the risk of unauthorized access by ensuring that users have appropriate permissions aligned with their roles. The software supports integration with cloud and on-premises applications, offering centralized visibility into user identities and access activities, assisting in streamlining identity lifecycle management and improving audit readiness.

Show More Details