• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Identity Governance and Administration

Identity Governance and Administration Reviews and Ratings

What are Identity Governance and Administration?

Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of NEXIS 4
NEXIS 4
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Pathlock
Pathlock
For 50M-1B USD Companies
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of Oracle Identity Governance
Oracle Identity Governance
Logo of Saviynt Identity Cloud
Saviynt Identity Cloud
For North America
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of Saviynt Identity Cloud
Saviynt Identity Cloud
Integration & Deployment
Logo of Saviynt Application Access Governance
Saviynt Application Access Governance
Logo of RadiantOne Identity Data Platform
RadiantOne Identity Data Platform
Logo of Microsoft Entra ID
Microsoft Entra ID

Product Listings

Filter by

Products 1 - 20 of 109
Sort by
Logo of Identity Security Cloud

Identity Security Cloud

By SailPoint Technologies

4.7
(731 Ratings)
customers choice 2024

SailPoint is a company that focuses on identity security for businesses, with an emphasis on utilizing artificial intelligence and machine learning. The firm automates the supervision and regulation of access, ensuring identities and resources are correctly linked. It offers an identity platform that integrates with pre-existing systems and workflows, offering a comprehensive view into all identities and their access. SailPoint’s identity solution adapts to the size, speed, and environmental needs of enterprises. The company assists enterprises globally to establish a foundation based on identity security.

Show More Details
Logo of Saviynt Identity Cloud

Saviynt Identity Cloud

By Saviynt

4.8
(391 Ratings)
customers choice 2024

Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every individual, internal or external, with timely access to digital resources. Through seamless integration of identity governance (IGA), application access, cloud security, and privileged account management, Saviynt's Identity Cloud provides converged identity security solutions for large enterprises. Consolidating essential identity security functionalities onto a unified platform, Saviynt's Identity Cloud enables administrators and users to efficiently govern and oversee the expanding array of identities across on-premises, cloud, and hybrid environments.

Show More Details
Logo of ManageEngine ADManager Plus

ManageEngine ADManager Plus

By ManageEngine

4.5
(361 Ratings)

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details
Logo of Oracle Identity Governance

Oracle Identity Governance

By Oracle

4.7
(347 Ratings)
customers choice 2024

Oracle is a cloud technology company that offers computing infrastructure and software solutions globally. This organization has developed an autonomous database, the first of its kind, to help manage and secure data. Oracle Cloud Infrastructure presents functionalities to facilitate the transition of workloads from on-site systems to the cloud, and vice versa, as well as between different clouds. Oracle's cloud software applications provide modern tools designed to support sustainable growth and resilience in businesses. Tools developed by Oracle are used by a wide range of users including nonprofit organizations and businesses of various sizes, to aid in operations like supply chain streamlining, human resource management, financial planning and connecting data and global users. Apart from business solutions, Oracle's technology also aids in tasks ranging from government defense to scientific and medical research.

Show More Details
Logo of ManageEngine AD360

ManageEngine AD360

By ManageEngine

4.6
(235 Ratings)

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details
Logo of Okta Lifecycle Management

Okta Lifecycle Management

By Okta

4.5
(211 Ratings)

Okta is an independent identity provider that focuses primarily on securely connecting individuals to suitable technology. Utilizing the Okta Identity Cloud, the firm eases the secure access to applications and infrastructure providers with its extensive range of pre-built integrations. Satisfying the needs of a variety of organizations, Okta leverages its solutions to safeguard the identities of workforce and customers, helping them attain their potential without fearing identity-related threats. The company operates on the idea that confident individuals and organizations can unlock their full potential when their identities are well-protected.

Show More Details
Logo of One Identity Manager

One Identity Manager

By One Identity

4.4
(155 Ratings)

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide.

Show More Details
Logo of Omada Identity

Omada Identity

By Omada

4.6
(140 Ratings)

Omada offers a full-featured, enterprise-grade, cloud-native Identity Governance and Administration (IGA) solution that enables organizations to maximize efficiency, reduce risk, and meet compliance requirements. Founded in 2000, Omada delivers innovative identity management to complex hybrid environments based on our technology, proven process framework, and deployment approach.

Show More Details
Logo of RadiantOne Identity Data Platform

RadiantOne Identity Data Platform

By Radiant Logic

4.7
(117 Ratings)

Radiant Logic provides the data foundation for an organization's identity-first security program. Specializing in Identity Security Posture Management, Radiant Logic unifies, analyzes, and secures an organization’s entire identity ecosystem in real-time.

RadiantOne is a data-driven platform that delivers identity hygiene at scale through the combination of identity data management, advanced analytics, and real-time observability. The RadiantOne platform unifies all of an organization's identity data, including legacy systems, cloud platforms, and machine identities, into a single authoritative source of truth. The platform also provides 360 degree observability with real-time risk assessments and leverages AI-powered remediation workflows to transform insights into actionable security outcomes.

Show More Details
Logo of IBM Security Verify Governance

IBM Security Verify Governance

By IBM

3.9
(110 Ratings)

IBM is a well-established entity focused on technology and development. The primary mission revolves around fostering technological growth and enhancing infrastructure, achieved through focused developments and consulting services. By encouraging inventiveness and innovation, it is geared towards facilitating the transition of theoretical ideas into practical realities, thus improving global functionalities. IBM brings about transformation by creating advanced solutions that reshape and redefine the world.

Show More Details
Logo of Microsoft Entra ID

Microsoft Entra ID

By Microsoft

4.4
(99 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of RSA Governance & Lifecycle

RSA Governance & Lifecycle

By RSA

4.3
(95 Ratings)

RSA is a company that offers comprehensive solutions for better digital security. Instead of focusing on traditional security methods, RSA takes an identity-first approach. This enables organizations to cope with the fast-paced digital world reinventing their security measures. The solutions include modern authentication systems, lifecycle management services, and a robust identity governance framework. The company can adapt its services across different platforms such as cloud-based, on-premises, or a combination of both, known as hybrid.

Show More Details
Logo of Symantec IGA

Symantec IGA

By Broadcom

4.2
(84 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of SAP Access Control

SAP Access Control

By SAP

4.4
(83 Ratings)

SAP was founded in 1972 and is headquartered in Walldorf, Germany. The company employs over 105,000 people globally and develops software solutions for enterprise resource planning (ERP) and related business functions. SAP’s early products, SAP R/2 and SAP R/3, were widely adopted for managing core business processes. Its current ERP platform, SAP S/4HANA, uses in-memory computing to support data-intensive operations and integrates capabilities such as artificial intelligence and machine learning.

SAP offers a portfolio of software applications that support various business functions across industries. These applications are designed to operate on a unified digital platform. As of 2025, SAP reports over 230 million cloud users and provides more than 100 solutions. The company’s offerings are used by organizations to manage finance, human resources, procurement, supply chain, and other operational areas.

Show More Details
Logo of Saviynt Application Access Governance

Saviynt Application Access Governance

By Saviynt

4.8
(79 Ratings)
customers choice 2024

Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every individual, internal or external, with timely access to digital resources. Through seamless integration of identity governance (IGA), application access, cloud security, and privileged account management, Saviynt's Identity Cloud provides converged identity security solutions for large enterprises. Consolidating essential identity security functionalities onto a unified platform, Saviynt's Identity Cloud enables administrators and users to efficiently govern and oversee the expanding array of identities across on-premises, cloud, and hybrid environments.

Show More Details
Logo of Omada Identity Cloud

Omada Identity Cloud

By Omada

4.5
(75 Ratings)

Omada offers a full-featured, enterprise-grade, cloud-native Identity Governance and Administration (IGA) solution that enables organizations to maximize efficiency, reduce risk, and meet compliance requirements. Founded in 2000, Omada delivers innovative identity management to complex hybrid environments based on our technology, proven process framework, and deployment approach.

Show More Details
Logo of OpenText Identity Manager (NetIQ)

OpenText Identity Manager (NetIQ)

By OpenText

4.1
(72 Ratings)

OpenText powers and protects information. As a global information management provider for businesses, OpenText tools span content management, Artificial Intelligence (AI), cybersecurity, cloud, and business networks. For over 30 years, OpenText has helped organizations manage and protect their data and documents while modernizing their information architecture. Its integrated hub connects information across departments and applications to enhance employee experience, productivity, and collaboration, while making information structured and searchable through AI, machine learning, and semantic search. In addition, OpenText delivers endpoint security and digital life protection solutions to safeguard businesses against cyberattacks and data breaches.

Show More Details
Logo of Pathlock

Pathlock

By Pathlock

4.6
(57 Ratings)

Pathlock focuses on simplifying the security, risk, and compliance struggles for digitally transformed organizations. The escalation of novel applications, threats and compliance requirements has outpaced the capabilities of traditional, separate solutions. Pathlock's solution is a unified platform for access governance, automating audit and compliance procedures, as well as fortifying application security. This allows complex organizations to confidently address their security and compliance needs in their core ERP and beyond. Pathlock aims to minimize risk exposure, enhance threat detection, streamline SoD management and boost IAM process efficiencies, supporting a more robust ERP security and compliance status.

Show More Details
Logo of Lumos Next-Gen IGA

Lumos Next-Gen IGA

By Lumos

4.7
(56 Ratings)

Lumos is a startup that brings together Identity Governance, Privileged Access Management and SaaS Management under one platform. This unified platform is designed to manage software access and vendors in a single space. The main aim of Lumos is to create a cost-effective solution that significantly reduces IT support costs, cutting software expenses and mitigating security risks.

Show More Details
Logo of Ping Identity Platform

Ping Identity Platform

By Ping Identity

4
(54 Ratings)

Ping Identity is a company centered on enhancing the safety and efficiency of digital experiences. The principal business issue it addresses is the challenge of maintaining high-security standards while simultaneously ensuring smooth interactions for users. It enables enterprises to integrate top-tier identity solutions with existing third-party services. The main objective is eliminating passwords, curtailing fraud, supporting Zero Trust, among other security measures. Ease of operation is a primary focus, with a drag-and-drop canvas serving as the chief mechanism for achieving these goals. Offices span multiple global locations with the head office situated in Denver, Colorado.

Show More Details

Features of Identity Governance and Administration

Updated November 2025

Mandatory Features:

  • Identity life cycle management and identity data integration (including with multiple sources)

  • Entitlement management and data integration (e.g., discovery, entitlement catalog management, and entitlement data enrichment, including descriptions, owners and sensitivity ratings)

  • Policy and role management

  • Auditing, reporting and basic analytics (descriptive and diagnostic analytics), including risk scoring

  • Provisioning via automated connectors (including some options for apps that don’t use System for Cross-Domain Identity Management [SCIM]) and via integration to IT service management (ITSM)/ticketing systems to trigger manual fulfillment flows

  • Access certification (also called attestation or review)

  • Access request processing and workflow orchestration

Peer Lessons Learned for Identity Governance and Administration

Published February 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Identity Governance and AdministrationLessons learned by your peers shared on Gartner Peer Insights for Identity Governance and AdministrationPeer Lessons Learned for Identity Governance andAdministrationLesson 1LESSON1Involve Business and IT Security Teams toOutline Requirements for an IGA SolutionLesson 2LESSON2Perform POCs to Detect Limitations andValidate Capabilities of IGA SolutionsLesson 3LESSON3Remove Data Gaps and Legacy Issues;Standardize IGA Policies and ProcessesLesson 4LESSON4Adhere to Standard Configurations; HireSpecialists for Rolling Out the IGA SolutionLesson 5LESSON5Coach Team Members to Ensure OptimalUtilization of the IGA Solutionn = 380Source: Reviews (380) submitted to Gartner Peer InsightsID: 6222287Gartner ®
Read Full Insights

Gartner Research

Market Guide for Identity Governance and Administration
Gartner Peer Insights 'Voice of the Customer': Identity Governance and Administration

Top Trending Products

Lumos Next-Gen IGANEXIS 4ZluriManageEngine AD360Identity Security CloudSaviynt Identity CloudSaviynt Application Access GovernanceAppsian Security Platform

Popular Product Comparisons

Identity Security Cloud vs Saviynt Identity Cloud

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.