Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Learn more
Whitepaper
Whitepaper
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
In den letzten Jahren ist IDaaS (Identity as a Service) zunehmend zu einer neuen Normalität geworden. Es bietet einen standardisierten, schnell umsetzbaren Ansatz für IAM (Identity and Access...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #151: Identity Governance and Administration
Identity Governance and Administration (IGA) combines the traditional User Access Provisioning (UAP) and Identity and Access Governance (IAG) markets. Nitish Deshpande joins Matthias for the first...
Learn more
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Why You Shouldn’t Just Use IGA for Third Party Access Management
Video
Why You Shouldn’t Just Use IGA for Third Party Access Management
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity...
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance...
Beyond Just SAP: The Need for Cross-LoB Access Controls
Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
In this webinar, you’ll learn about The changing landscape of LoB applications and how to tackle the access-related challenges Requirements on modern solutions for access control...
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen...
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access...
Eviden DirX Identity
Executive View
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is...
Access Control Tools for Multi-vendor LoB Environments
Leadership Compass
Access Control Tools for Multi-vendor LoB Environments
This report provides an overview of the market for Access Control Tools for business application environments that are based on applications of multiple vendors but including SAP solutions such as...
Effective Application Access Controls in the Modern Business IT Landscape
Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls...
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
Analyst Chat
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
In the episode of the KuppingerCole Analyst Chat series, Martin Kuppinger and host Matthias engage in a detailed discussion about the challenges associated with the integration of Identity...
1 2 3 4 5 6 7 Next