fitgap

Symantec IGA

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Symantec IGA and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial unavailable
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Banking and insurance
  2. Healthcare and life sciences
  3. Energy and utilities

What is Symantec IGA

Symantec IGA is an identity governance and administration product used to manage user access lifecycle, access requests, and governance controls across enterprise applications. It targets IT security and identity teams that need provisioning workflows, role and entitlement management, and compliance-oriented reporting. The product is typically deployed in environments that integrate with directories and enterprise systems and require formal approval and certification processes.

pros

Strong governance workflows

Supports access request, approval routing, and policy-driven provisioning processes that align with common governance requirements. Provides mechanisms for access reviews/certifications and audit-oriented reporting to help document who has access to what and why. This fits organizations that need structured controls rather than only authentication and login features.

Enterprise integration focus

Designed to connect with enterprise identity sources and downstream applications for joiner/mover/leaver lifecycle management. Works in environments where identity data originates from HR systems and directories and must be propagated to multiple systems. This emphasis is useful when governance must span heterogeneous on-prem and enterprise application stacks.

Role and entitlement management

Provides capabilities to model roles and manage entitlements to standardize access assignment. Helps reduce ad hoc access grants by using role-based access patterns and controlled exceptions. This can improve consistency for large user populations with repeatable job functions.

cons

Implementation complexity and effort

IGA programs typically require connector configuration, identity data normalization, role engineering, and workflow design. Time-to-value depends heavily on the number of target systems and the maturity of identity data and processes. Smaller teams may find ongoing administration and tuning resource-intensive.

Product lineage and ownership changes

The Symantec identity portfolio has undergone ownership transitions, which can affect product naming, packaging, and support channels over time. Buyers may need to validate the current roadmap, support model, and licensing under the present owner. This due diligence is important for long-term platform planning.

Not CIAM-first design

The product’s core is identity governance (internal workforce and enterprise access controls) rather than customer identity experiences. Organizations primarily seeking CIAM features such as consumer registration, progressive profiling, and customer journey optimization may need additional components. This can increase architectural complexity for customer-facing use cases.

Plan & Pricing

No public pricing or tiered plans were found on the vendor's official website (Broadcom/Symantec). Broadcom’s official product/support pages instruct customers to contact Broadcom/Broadcom Sales or Customer Care for licensing and pricing information.

Seller details

Broadcom Inc.
Palo Alto, California, USA
1961
Public
https://www.broadcom.com/
https://x.com/Broadcom
https://www.linkedin.com/company/broadcom/

Tools by Broadcom Inc.

VMware Integrated OpenStack
Layer7 API Management
Layer7 API Gateway
Layer7 API Developer Portal
Clarity Design System
Automic Automation
Automic Automation
Tanzu
Photon OS
VMware NSX
CA Endevor
Panvalet
Broadcom Service Virtualization
CA RFID Asset Management
Clarity
VMware Cloud Foundation
VMware Cloud Director
VMware Cloud on AWS
VMware vSphere Foundation
DX Unified Infrastructure Management

Popular categories

All categories