Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
Webinar
Webinar
Re-Imagining Identity Management for the Digital Era
An explosion of digital identities, coupled with multi-cloud adoption and the trend of working from anywhere, is adding complexity to managing identities and access rights. An innovative strategy...
Learn more
Blog
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Learn more
Executive View
Executive View
Omada Identity Cloud
Omada Identity Cloud is an IDaaS (Identity-as-a-Service) solution focusing on IGA (Identity Governance & Administration) capabilities. It supports all relevant areas such as User Lifecycle...
Learn more
Event Recording
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Learn more
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Enhancing Zero Trust in a ServiceNow Environment
Blog
Enhancing Zero Trust in a ServiceNow Environment
Zero Trust has been established as the guiding principle for cybersecurity. The “don’t trust, always verify” approach stands for methods that don’t rely only on singular security tools, such as the...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
IGA in a World of Zero Trust
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
IGA in the Cloud without Compromise
Blog
IGA in the Cloud without Compromise
There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud...
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
Blog
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital...
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Blog
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial...
Is there still a need for keeping Identity Provisioning and Access Governance separate?
Blog
Is there still a need for keeping Identity Provisioning and Access Governance separate?
When looking at the core IAM (Identity and Access Management) market with its main product categories of Identity Provisioning and Access Governance, some customers and vendors currently raise the...
Entitlement & Access Governance – the next generation of core IAM
Blog
Entitlement & Access Governance – the next generation of core IAM
In my new report “ Entitlement & Access Governance ”, published yesterday, I introduce a new term and abbreviation: EAG for Entitlement & Access Governance. Thanks to Dave Kearns for...
1 2 Next