Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
Webinar
Webinar
Re-Imagining Identity Management for the Digital Era
An explosion of digital identities, coupled with multi-cloud adoption and the trend of working from anywhere, is adding complexity to managing identities and access rights. An innovative strategy...
Learn more
Blog
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Learn more
Market Compass
Market Compass
IGA Solutions for ServiceNow Infrastructures
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the market of IGA (Identity Governance &...
Learn more
Event Recording
Event Recording
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Learn more
Analyst Chat #151: Identity Governance and Administration
Analyst Chat
Analyst Chat #151: Identity Governance and Administration
Identity Governance and Administration (IGA) combines the traditional User Access Provisioning (UAP) and Identity and Access Governance (IAG) markets. Nitish Deshpande joins Matthias for the first...
Multi-Cloud Identity Governance 101
Webinar Recording
Multi-Cloud Identity Governance 101
In an effort to cut costs, improve efficiencies, and cater for a mobile and remote workforce, businesses are adopting cloud services from multiple providers. This has created a host of challenges...
Dealing Effectively with Modern, Industrialized Cyber Threats
Webinar Recording
Dealing Effectively with Modern, Industrialized Cyber Threats
The cyber threat landscape has become very complex, with state-of-the-art intrusion, ransomware, and cryptocurrency mining tools now readily available through online stores and service providers,...
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA
Webinar Recording
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA
Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of...
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Webinar Recording
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der...
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
Webinar Recording
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM...
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
David Doret: Improving IAM Success Rates with Rigorous Concepts
Event Recording
David Doret: Improving IAM Success Rates with Rigorous Concepts
Robert Byrne: IGA in the Cloud without Compromise
Event Recording
Robert Byrne: IGA in the Cloud without Compromise
Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity...
Interview with Robert Byrne
Event Recording
Interview with Robert Byrne
1 2 3 4 5 Next