Try our new research platform with insights from 80,000+ expert users

EVOLVEUM midPoint vs IBM Security Identity Governance and Intelligence comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

EVOLVEUM midPoint
Ranking in Identity Management (IM)
22nd
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
3
Ranking in other categories
No ranking in other categories
IBM Security Identity Gover...
Ranking in Identity Management (IM)
30th
Average Rating
7.6
Reviews Sentiment
6.7
Number of Reviews
2
Ranking in other categories
User Provisioning Software (14th)
 

Mindshare comparison

As of March 2026, in the Identity Management (IM) category, the mindshare of EVOLVEUM midPoint is 2.1%, down from 2.9% compared to the previous year. The mindshare of IBM Security Identity Governance and Intelligence is 1.2%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
EVOLVEUM midPoint2.1%
IBM Security Identity Governance and Intelligence1.2%
Other96.7%
Identity Management (IM)
 

Featured Reviews

Ondrej Balun - PeerSpot reviewer
IAM Expert Group Lead at Ventum
An open-source solution that helps in IAM
Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation. Users are granted access based on predefined roles associated with their positions, organizational hierarchy, or job titles. Instead of direct assignments, users automatically receive roles upon entering the company, aligning with their assignments. The core feature of EVOLVEUM midPoint that I find most valuable is provisioning. Users, including myself, can submit requests that need designated individuals' approval. Additionally, the recertification feature is crucial for regularly reviewing and confirming the appropriateness of user access rights. I find recertifications valuable because they align with clear regulatory requirements for companies to perform them at least once yearly. Using the product, I can initiate a recertification campaign by selecting users and the applications to be recertified. I define the individuals responsible for approving or rejecting access. The goal is to ensure compliance with regulatory standards. The tool's flexibility in handling identity types and tickets has brought notable benefits. It provides full flexibility to extend attributes or the schema for users and organizations. Its audit and reporting capabilities have significantly enhanced our customer's compliance and security posture. Management's regular need for reports, such as the number of users in the application and identifying users with critical access, is addressed. The solution allows easy configuration of reports directly from the front end. Additionally, the ability to schedule and automate report execution, followed by automatic distribution to support or responsible personnel, streamlines the process.
reviewer1830612 - PeerSpot reviewer
Head, Cybersecurity at a tech services company with 11-50 employees
We use the solution to ensure organizations conform to industry base certifications and best practices
We use the product to ensure organizations conform to industry base certifications and best practices and do not contradict their security policies within the base points they specify in the system, which are used to match everything against their governance use cases I think the product's most…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The basic setup is straightforward and takes minutes to complete."
"Because the product is automating processes, if somebody joins the company, based on his or her role within the company he or she gets proper rights and accesses to the target systems."
"Our customers leverage the product as a central component in their identity field management. The process involves connecting it to target systems through connectors. It also helps us in role-based access control implementation."
"I like that it's open-source, and it's working. It has nice features, and it looks like it's easy to maintain."
"The basic setup is straightforward and takes minutes to complete."
"I would rate the price eight out of 10, with 10 as the best value for money."
"Lifecycle management, governance and documentation."
"We use the product to ensure organizations conform to industry base certifications and best practices and do not contradict their security policies within the base points they specify in the system, which are used to match everything against their governance use cases."
"This solution has a very good dashboard and the documentation is also very good, and life cycle management and governance are also good features in this solution."
 

Cons

"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"I think that the product is missing some of the identity governance functions related the data provenance."
"I think that the product is missing some of the identity governance functions—for example, the legal stuff and GDPR, and so on. But I think they are currently working on it."
"One area where I see room for improvement in EVOLVEUM midPoint is enhancing the user interface for configuration. Currently, a significant portion of the configuration involves technical, XML-based settings requiring a higher level of technical expertise."
"The support isn't ideal - because the product is open-source, it relies on your own ability to make it work unless you pay for support at a high hourly rate."
"Self service center is not always easy to understand."
"The solution is also a bit pricey for the Nigeria region."
"The solution is a bit pricey for some regions."
"I think improvements could be made in the self service center, making it easier for the user to understand."
 

Pricing and Cost Advice

"Licensing is defined by the number of users."
"The product is free to use, but a cost is associated if you opt for official product support. Additionally, there is an option for a platform subscription, which entails professional services provided by the vendor."
"We're EVOLVEUM partners, and I tried it without a license."
"I would rate the price eight out of 10, with 10 as the best value for money."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
885,286 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
16%
Government
9%
Outsourcing Company
8%
Comms Service Provider
7%
Financial Services Firm
15%
Government
13%
Construction Company
11%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Also Known As

No data available
IGI, IBM Security Identity Manager, ISIM
 

Overview

 

Sample Customers

European Commisson, University of Illinois, First United Bank & Trust, Deutsche Telekom, Vodafone, Avast
E.ON Global Commodities
Find out what your peers are saying about EVOLVEUM midPoint vs. IBM Security Identity Governance and Intelligence and other solutions. Updated: March 2026.
885,286 professionals have used our research since 2012.