RSA Identity Governance and Lifecycle can be deployed on the cloud or on-premise. We have our own proprietary cloud solution created along with RSA Identity Governance and Lifecycle and it's deployed on the AWS platform. We use RSA Identity Governance and Lifecycle for a broad level use case for service, mainly on the governance of the overall lifecycle of the entities. However, the use depends on the business of the clients, but mainly on managing their entities.
We are a solution provider and this is one of the products that we implement for our clients. I have helped to deploy this solution to two customers so far. The primary use case is the addition of another layer of authentication for users to access the network.
Learn what your peers think about RSA Identity Governance and Lifecycle. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
RSA SecurID provides world-leading two-factor authentication, protecting 25,000 organizations and 55 million users. RSA SecurID extends security to bring your own device (BYOD), cloud, and mobile as well as traditional virtual private network (VPN) and web portals. RSA SecurID solutions comprise three primary components: authenticator, platform, and agents.
RSA Identity Governance and Lifecycle can be deployed on the cloud or on-premise. We have our own proprietary cloud solution created along with RSA Identity Governance and Lifecycle and it's deployed on the AWS platform. We use RSA Identity Governance and Lifecycle for a broad level use case for service, mainly on the governance of the overall lifecycle of the entities. However, the use depends on the business of the clients, but mainly on managing their entities.
I use this solution for joiners/movers/leavers along with the add-back, role-based access control, and certification.
We are a solution provider and this is one of the products that we implement for our clients. I have helped to deploy this solution to two customers so far. The primary use case is the addition of another layer of authentication for users to access the network.