
Symantec IGA
Customer identity and access management (CIAM) software
Identity and access management (IAM) software
Self-service password reset (SSPR) software
User provisioning and governance tools
Identity management software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Symantec IGA and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Banking and insurance
- Healthcare and life sciences
- Energy and utilities
What is Symantec IGA
Symantec IGA is an identity governance and administration product used to manage user access lifecycle, access requests, and governance controls across enterprise applications. It targets IT security and identity teams that need provisioning workflows, role and entitlement management, and compliance-oriented reporting. The product is typically deployed in environments that integrate with directories and enterprise systems and require formal approval and certification processes.
Strong governance workflows
Supports access request, approval routing, and policy-driven provisioning processes that align with common governance requirements. Provides mechanisms for access reviews/certifications and audit-oriented reporting to help document who has access to what and why. This fits organizations that need structured controls rather than only authentication and login features.
Enterprise integration focus
Designed to connect with enterprise identity sources and downstream applications for joiner/mover/leaver lifecycle management. Works in environments where identity data originates from HR systems and directories and must be propagated to multiple systems. This emphasis is useful when governance must span heterogeneous on-prem and enterprise application stacks.
Role and entitlement management
Provides capabilities to model roles and manage entitlements to standardize access assignment. Helps reduce ad hoc access grants by using role-based access patterns and controlled exceptions. This can improve consistency for large user populations with repeatable job functions.
Implementation complexity and effort
IGA programs typically require connector configuration, identity data normalization, role engineering, and workflow design. Time-to-value depends heavily on the number of target systems and the maturity of identity data and processes. Smaller teams may find ongoing administration and tuning resource-intensive.
Product lineage and ownership changes
The Symantec identity portfolio has undergone ownership transitions, which can affect product naming, packaging, and support channels over time. Buyers may need to validate the current roadmap, support model, and licensing under the present owner. This due diligence is important for long-term platform planning.
Not CIAM-first design
The product’s core is identity governance (internal workforce and enterprise access controls) rather than customer identity experiences. Organizations primarily seeking CIAM features such as consumer registration, progressive profiling, and customer journey optimization may need additional components. This can increase architectural complexity for customer-facing use cases.
Plan & Pricing
No public pricing or tiered plans were found on the vendor's official website (Broadcom/Symantec). Broadcom’s official product/support pages instruct customers to contact Broadcom/Broadcom Sales or Customer Care for licensing and pricing information.
Seller details
Broadcom Inc.
Palo Alto, California, USA
1961
Public
https://www.broadcom.com/
https://x.com/Broadcom
https://www.linkedin.com/company/broadcom/