Solutions Review’s annual Vendors to Know in Identity Governance platforms provides the details on some of the most critical solution providers in the space.
The editors at Solutions Review continually research the most prominent and influential identity governance vendors to assist buyers in searching for the tools befitting their organization’s needs. Choosing the right vendor and solution can be complicated; it requires constant market research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we listed the vendors to know in identity governance in 2021.
Note: Companies are listed in alphabetical order.
Vendors to Know in Identity Governance Platforms, 2021
Broadcom folded CA Technologies’ end-to-end Identity Management portfolio with its Identity Suite, Secure Cloud IDaaS solution, Single Sign-On, Advanced Authentication, and Privileged Access Management Capabilities. In fact, it renamed its CA Technologies portfolio to the Layer7 Identity Management solution. For IGA, Layer7 provides an integrated solution for privileged user governance, role discovery, lifecycle management, and identity compliance. Layer7 also helps enterprises deal with entitlement creep; Broadcom’s identity management increases audit and compliance efficiency through streamlined governance campaigns.
Fischer International provides Compliance and Audit features as part of its IAM solution: Identity as a Service (IaaS). IaaS is an enterprise-grade full-suite identity solution for your enterprise’s private cloud or on-premise servers. Fischer offers Access Governance features to automatically and reliably control user accounts and privileges across internal and external systems based on user risk profiles and roles. Fischer also offers complete audit logging for all security events, including provisioning, deprovisioning, workflow, and access requests. Fischer’s International provides over 100 out-of-the-box reporting options, ensuring comprehensive compliance for any industry or regulatory mandate.
HID Global offers an array of solutions ranging from biometric sensors and read modules; these include OEM embedded reader modules and finished desktop readers that validate identity using fingerprints or hard tokens. HID Global’s solutions can integrate into existing business systems, both analog and digital. Its solutions feature advanced multifactor authentication, credential management, and analytics. A philosophy of Zero Trust drives its innovations and facilitates digital certification. HID Global also provides access control systems with support for a wide range of credential technologies. Also, it tailors its specific solutions to match different verticals and use cases.
IBM Security’s Identity Governance and Administration suite—Identity Governance and Intelligence (IGI)—combines the IBM Security Identity Manager (ISIM) with IBM Security Identity Governance (ISIG) solutions for strong automation and some of the strongest governance abilities in the identity security market. IGI covers enterprises’ user lifecycle management, access risk assessment and mitigation, certification, password management, as well as for analytics and reporting to enable businesses to make the right decisions on enterprise access and remain within industry compliance. IBM’s products typically offer deep functionality and strong connectivity with a broad range of complementary products.
Identity Automation’s solution, RapidIdentity, supports not only identity governance and administration capabilities but automated provisioning and access and account management as well. These are available as both on-premises and SaaS deployments for all types of enterprise IT environments. Its Identity Governance solution ensures access controls are maintained and updated through business and data changes via a simplified policy configuration; this bypasses the need for custom coding, which can add a serious burden to IT security teams. Identity Automation’s Rapididentity is centrally implemented and managed to enable efficient compliance reporting and easy permissions evaluation.
Micro Focus owns the NetIQ identity and access management suite. The company offers both NetIQ Identity Management and NetIQ Identity Governance. This suite is offered with several optional add-ons, such as Access Review—an identity governance add-on—and the NetIQ Access Governance Suite (AGS). Micro Focus’ Data Access Governance allows control over unstructured data and for greater visibility into data access. It can also streamline user provisioning. The product is described as lightweight and capable of scaling to billions of devices. As such, Micro Focus can monitor and record all enterprise users’ activities within the provisioned systems, as well as enforcing the Principle of Least Privilege.
Omada has nearly 20 years in the identity governance and administration market. Omada features a flexible data model, excellent dashboards, and powerful reporting capabilities, including closed-loop reporting. User-facing elements of all identity lifecycle scenarios support a flexible data model for user entitlements. Omada also offers specific identity provisioning services and industry-tailored solutions for several verticals, including Banking and Finance, Life-Sciences, Manufacturing, Public, Utilities, and Retail.
One Identity offers its Identity Governance Solution, which can come in 13 different languages, and therefore enjoys strong popularity in overseas markets. The One Identity solution provides a unified governance foundation that addresses enterprise management, auditing, and industry compliance needs; it is a modular and integrated approach to account governance that provides rapid time-to-value by offering comprehensive functionality. This, in turn, allows One Identity’s customers to build on their existing security and identity investments. One Identity offers different “editions” offered to different verticals, including but not limited to communications, banking, insurance, and media services.
The Oracle Identity Governance (OIG) Suite is an integrated solution that centralizes security for applications and web services and provides a single point of contact for support under a single license contract; this can be a boon for overstretched IT security teams looking for simple maintenance. OIG suite is marketed for and well-suited to large enterprise customers with substantial global footprints. As such, OIG is a highly complex, scalable, and flexible product capable of solving identity governance problems for businesses of all sizes. It provides actionable identity intelligence through automated controls, rich dashboards, and risk-based analytics.
Ping Identity’s PingDataGovernance solution is designed to provide centralized, fine-grain policy control over access to your enterprise’s stored identities and profiles for users and third parties alike. PingDataGovernance can restrict internal and external applications from accessing specific attributes, databases, or entire identity profiles, preventing access creep or misuse of credentials. The PingDataGovernance identity governance policies can help you adhere to your privacy compliance regulations and corporate mandates by restricting access to identity and profile data based on user consent, the requesting application, and even based on external data sources and threat intelligence.
PlainID integrates with leading identity governance and administration solutions providing a real-time, policy-based Authorization Platform. It offers a policy-based access control (PBAC) solution that simplifies authorization to one point of decision, one point of control, and one point of view across enterprises’ cloud, mobile, and legacy applications. The policy-based access control solution is designed to replace legacy role-based and attribute-based authorization solutions. Companies that use PlainID benefit from a scalable graph database-based authorization platform and the flexibility to work in any language/ standard necessary, including XACML, JSON, OAuth, SQL, MongoDB, etc.
RSA offers identity governance and administration through its RSA Identity Governance and Lifecycle solution: a highly scalable identity management suite built from separately licensed components. RSA’s Archer Governance, Risk, and Compliance products are highly capable and a good fit for companies with heavy identity governance needs and stringent industry and regulatory compliance requirements; RSA provides a common foundation for managing policies, controls, risks, assessments, and deficiencies across your lines of business and even including third-parties. In 2020, RSA was acquired by Symphony Technology Group.
SailPoint’s true identity security strength lies in its access governance and administration capabilities, which build off of SailPoint’s background as a renowned innovator in identity access and governance. IdentityIQ, offered as a standalone on-premises product with several optional add-ons, is well regarded by industry experts for its strong identity governance capabilities and provisioning capabilities. It specializes in hybrid IT environments and even offers hosted managed services for governance, a boon for enterprises looking to alleviate the burden on overstretched IT security teams. Its compliance controls can help define and enforce user access policies, preventing access creep via strict enforcement.
Saviynt’s identity governance solutions enable enterprises to secure their applications, data, and corporate infrastructure in a single cloud or on-premise platform. It approaches identity governance holistically, moving beyond core identity governance to incorporate cloud security, application GRC, and access governance—all within a complete cloud-based solution. Saviynt’s platform can facilitate and automate user access reviews, onboarding, and lifecycle management, import access and usage data from applications in real-time or as a batch, recognize violations, and offer security remediations. Saviynt’s IGA solutions can also develop rules and roles-based policies on user data, attributes, and behaviors and offer suggestions on managing roles and permissions.
Simeio offers its own identity governance and administration service. That service, the Identity Orchestrator platform, automates compliance reporting and protects against both internal and external threats with password and role management, access creep prevention, segregation of duties enforcement, and identity proofing. Simeio’s Identity Orchestrator also offers Core Directory Services to help enterprises manage their identities on a global scale with directory solutions, as well as a Cloud Security infrastructure that can be automated for identity administration and role management. It released the Simeio Identity Vault this year.
Tools4ever develops and provides standardized and affordable Identity Governance & Administration (IGA) solutions that can be deployed and adopted within a few weeks and are easily managed by enterprise IT security teams. Tools4ever also offers an in-house team of IT consultants to assist with IGA deployment and implementations, as well as self-service resets, centralized access reporting, audit logs, and SSO, which all facilitate identity governance; this is crucial to enterprises with limited security resources and talent. It also offers identity management as a Service through its HelloID solution, which is designed for cloud environments and offers identity self-service and workflow automation.
Those were our picks for the Vendors to Know in Identity Governance platforms, 2021. For more on these Vendors to Know in Identity Governance platforms, check out the Buyer’s Guide.
- The Best Identity Governance Tools and Vendors in 2023 - December 31, 2022
- The Best Privileged Access Management Providers for 2023 - November 1, 2022
- The 10 Best Free and Open-Source Identity Management Tools - October 15, 2022