Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Learn more
Executive View
Executive View
Pathlock Platform
This KuppingerCole Executive View report looks at the Pathlock Platform, a SaaS-based solution for managing access and entitlements in Line of Business (LoB) solutions such as SAP.
Learn more
Webinar Recording
Webinar Recording
Simplify Identity Management With User Centric Personas and PBAC
Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining...
Learn more
IGA in a World of Zero Trust
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
IGA in the Cloud without Compromise
Blog
IGA in the Cloud without Compromise
There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud...
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
Event Recording
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
With 77 percent of the world’s transaction revenue touching SAP ERP systems, these crown jewels have long been the prime target for cybercrime and internal threats due to Separation of...
Accelerate your Identity's Digital Transformation
Interview
Accelerate your Identity's Digital Transformation
Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Pooja Agrawalla: Are You Building a Legacy IGA?
Event Recording
Pooja Agrawalla: Are You Building a Legacy IGA?
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Event Recording
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you...
Flemming Hartwich: IGA - the Right Place for Identities?
Event Recording
Flemming Hartwich: IGA - the Right Place for Identities?
Stephanie van der Loos: Seamless Employee Access Lifecycle
Event Recording
Stephanie van der Loos: Seamless Employee Access Lifecycle
Insights of A CISO: Interview with Dr. Ralf Schneider
Event Recording
Insights of A CISO: Interview with Dr. Ralf Schneider
Previous
4 5 6 7 8 9 10 Next