Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Learn more
Whitepaper
Whitepaper
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Manually granting access to entitlements and access reviews is not easy. Organizations are shifting focus towards learning and discovering capabilities. Automation tools such as policy mining are...
Learn more
Event Recording
Event Recording
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Imagine a world where security risks are identified and mitigated before they even happen. Imagine if access and auditing recommendations were made with the precision of a computer algorithm....
Learn more
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management)...
Re-Imagining Identity Management for the Digital Era
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those...
Analyst Chat #162: Trends and Predictions for 2023 - Integration of IGA and Data Governance
Analyst Chat
Analyst Chat #162: Trends and Predictions for 2023 - Integration of IGA and Data Governance
In this podcast episode, Martin Kuppinger and Matthias explore the upcoming trend of IGA (Identity Governance and Administration) solutions to have an increasing level of integration with Data...
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
In diesem Webinar lernen Sie: Warum Zugriffskontrollen auch über Systemgrenzen hinweg funktionieren müssen und nicht auf SAP-Systeme beschränkt sein können Wie...
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Analyst Chat #151: Identity Governance and Administration
Analyst Chat
Analyst Chat #151: Identity Governance and Administration
Identity Governance and Administration (IGA) combines the traditional User Access Provisioning (UAP) and Identity and Access Governance (IAG) markets. Nitish Deshpande joins Matthias for the first...
Identity Governance and Administration 2022
Leadership Compass
Identity Governance and Administration 2022
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided...
Enhancing Zero Trust in a ServiceNow Environment
Blog
Enhancing Zero Trust in a ServiceNow Environment
Zero Trust has been established as the guiding principle for cybersecurity. The “don’t trust, always verify” approach stands for methods that don’t rely only on singular security tools, such as the...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
ZertID from Sysintegra
Executive View
ZertID from Sysintegra
Sysintegra ZertID is an IGA solution that is built on top of the ServiceNow platform. It integrates natively with ServiceNow features such as the CMDB and Security Incident handling. By utilizing...
Previous
1 2 3 4 5 6 7 Next