Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
Learn more
Market Compass
Market Compass
IGA Solutions for ServiceNow Infrastructures
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the market of IGA (Identity Governance &...
Learn more
Event Recording
Event Recording
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Imagine a world where security risks are identified and mitigated before they even happen. Imagine if access and auditing recommendations were made with the precision of a computer algorithm....
Learn more
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Webinar Recording
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der...
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
Webinar Recording
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM...
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
Robert Byrne: IGA in the Cloud without Compromise
Event Recording
Robert Byrne: IGA in the Cloud without Compromise
Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity...
David Doret: Improving IAM Success Rates with Rigorous Concepts
Event Recording
David Doret: Improving IAM Success Rates with Rigorous Concepts
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Event Recording
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Interview with Robert Byrne
Event Recording
Interview with Robert Byrne
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Previous
3 4 5 6 7 8 9 Next