

OpenText Identity Governance and IBM Security Identity Governance and Intelligence are competitors in identity management and governance. IBM holds a stronger position due to a more robust feature set, despite its higher pricing.
Features: OpenText Identity Governance offers strong access controls, compliance monitoring, and easy integration with existing systems. IBM Security Identity Governance and Intelligence provides advanced analytics, comprehensive reporting, and complex identity lifecycle management.
Ease of Deployment and Customer Service: OpenText supports straightforward deployment with strong technical support, focusing on reducing setup time and complexity. IBM offers a comprehensive service model that may involve a longer setup time, providing detailed guidance and assistance after deployment.
Pricing and ROI: OpenText presents competitive pricing with a focus on rapid ROI through efficient deployment and lower initial costs. IBM requires a higher upfront investment, potentially offering a more significant ROI for businesses utilizing its extensive features and scalability over time.
| Product | Mindshare (%) |
|---|---|
| OpenText Identity Governance | 1.5% |
| IBM Security Identity Governance and Intelligence | 1.3% |
| Other | 97.2% |

| Company Size | Count |
|---|---|
| Small Business | 9 |
IBM Security Identity Governance and Intelligence is a comprehensive platform designed to help businesses manage identity governance and compliance. It enables organizations to streamline processes while ensuring security.
Focusing on identity governance, IBM Security Identity Governance and Intelligence offers valuable features that enhance security and operational efficiency. It provides tools for effective access management and auditing, ensuring that enterprises maintain compliance with regulations. As businesses navigate complex regulatory environments, this platform becomes crucial in safeguarding sensitive information and supporting IT governance strategies, ultimately securing business operations and data integrity.
What are the key features of IBM Security Identity Governance and Intelligence?IBM Security Identity Governance and Intelligence is implemented across industries such as finance, healthcare, and retail. In finance, it supports stringent compliance requirements, ensuring data protection and secure transactions. In healthcare, it safeguards patient data, enabling secure access for medical professionals while maintaining privacy standards. Retailers use it to protect consumer data and streamline employee access management, ensuring both customer trust and efficient back-end operations.
OpenText Identity Governance provides robust access review capabilities, risk analysis, and intuitive dashboards. Its advanced role mining and dynamic grouping ensure efficient access management, supporting compliance through separations of duties.
OpenText Identity Governance enhances access management and auditing processes through features such as role mining, access certification, and separations of duties that support efficient management protocols. Though it excels in stability, scalability, and integration with Identity Management solutions, it requires improvements in installation, Workflow Designer, and cloud application connectors. Addressing stability issues and offering enhanced Identity Intelligence features are essential for competitive edge. The governance tool leverages automated reporting and approval workflows, aiding large environments in streamlining management tasks. Its ability to integrate closely with NetIQ Identity Manager facilitates internal audits, particularly in banking and governmental sectors.
What are the key features?OpenText Identity Governance sees deployment in industries like banking and government, where auditing and access management are critical. It aids in permission management and account discovery, utilized notably in regions such as Chile and Argentina. Organizations benefit from its integration with NetIQ Identity Manager to ensure proper account activation and deactivation, ultimately facilitating sector-specific compliance and auditing tasks.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.