Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
Learn more
Executive View
Executive View
Omada Identity Suite
Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automation or providing...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #170: Trends and Predictions for 2023 - Market Trends in IGA
Matthias is joined by Marina Iantorno in this episode to discuss the trends and predictions for IGA beyond 2023. Marina sheds light on the diverse market segment through KuppingerCole's analysis...
Learn more
SAP IDM End of Life: Die IGA-Migration souverän meistern
Webinar Recording
SAP IDM End of Life: Die IGA-Migration souverän meistern
KuppingerCole Lead Advisor Dr. Phillip Messerschmidt wird die Besonderheiten im SAP-Umfeld und SAP- IdM in einem kurzen Überblick beleuchten. Außerdem wird er aufzeigen,...
IGA and LoB Application Access Management: What We’ll See in 2024
Webinar Recording
IGA and LoB Application Access Management: What We’ll See in 2024
In this webinar, you will learn about The current state of IGA and Application Access Management convergence Trends impacting these areas: Generative AI, Risk Based Access Controls,...
Modernizing IGA: A Guide for IAM Leaders
Webinar Recording
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Evolveum MidPoint 4.8 Release
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Why You Shouldn’t Just Use IGA for Third Party Access Management
Video
Why You Shouldn’t Just Use IGA for Third Party Access Management
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity...
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance...
Beyond Just SAP: The Need for Cross-LoB Access Controls
Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
In this webinar, you’ll learn about The changing landscape of LoB applications and how to tackle the access-related challenges Requirements on modern solutions for access control...
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen...
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access...
Eviden DirX Identity
Executive View
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is...
Access Control Tools for Multi-vendor LoB Environments
Leadership Compass
Access Control Tools for Multi-vendor LoB Environments
This report provides an overview of the market for Access Control Tools for business application environments that are based on applications of multiple vendors but including SAP solutions such as...
1 2 3 4 5 6 7 8 9 Next