

RSA Identity Governance and Lifecycle and IBM Security Identity Governance and Intelligence compete in identity management with IBM offering a richer feature set and RSA providing advantages in pricing and support.
Features: RSA Identity Governance and Lifecycle is known for effective access request management, role management, and supporting easy application integration. IBM Security Identity Governance and Intelligence stands out with advanced analytics, detailed policy management, and comprehensive reporting tools tailored for complex environments.
Ease of Deployment and Customer Service: RSA Identity Governance and Lifecycle is praised for straightforward deployment and dependable support, which accommodates various IT environments via reduced setup complexity. IBM Security Identity Governance and Intelligence, while strong in customer service, can encounter deployment challenges that necessitate significant resources for setup.
Pricing and ROI: RSA Identity Governance and Lifecycle is associated with competitive initial costs and favorable ROI, which attracts budget-conscious organizations. IBM Security Identity Governance and Intelligence, with a higher price, offers substantial ROI through its extensive capabilities, appealing to larger enterprises looking for advanced solutions.
| Product | Mindshare (%) |
|---|---|
| RSA Identity Governance and Lifecycle | 1.2% |
| IBM Security Identity Governance and Intelligence | 1.2% |
| Other | 97.6% |

| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 2 |
| Large Enterprise | 6 |
IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.