Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
Webinar
Webinar
Re-Imagining Identity Management for the Digital Era
An explosion of digital identities, coupled with multi-cloud adoption and the trend of working from anywhere, is adding complexity to managing identities and access rights. An innovative strategy...
Learn more
Blog
Blog
IGA in the Cloud without Compromise
There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud...
Learn more
Executive View
Executive View
Atos DirX Audit
DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can analyze concrete...
Learn more
Interview
Interview
Accelerate your Identity's Digital Transformation
Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.
Learn more
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Event Recording
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you...
Stephanie van der Loos: Seamless Employee Access Lifecycle
Event Recording
Stephanie van der Loos: Seamless Employee Access Lifecycle
Joakim Hardell: Cloud Strategy vs. National Security. Telia's Road to IGA Systems Modernization
Event Recording
Joakim Hardell: Cloud Strategy vs. National Security. Telia's Road to IGA Systems Modernization
We will give you a sneak peek on Telia Company’s current journey towards IGA system modernization. After the presentation you will have a good overview and some insight in what is cooking...
Insights of A CISO: Interview with Dr. Ralf Schneider
Event Recording
Insights of A CISO: Interview with Dr. Ralf Schneider
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Event Recording
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Flemming Hartwich: IGA - the Right Place for Identities?
Event Recording
Flemming Hartwich: IGA - the Right Place for Identities?
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
Event Recording
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market,...
Pooja Agrawalla: Are You Building a Legacy IGA?
Event Recording
Pooja Agrawalla: Are You Building a Legacy IGA?
Where to Start Your IAM Modernization Journey
Video
Where to Start Your IAM Modernization Journey
Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at...