Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Learn more
Whitepaper
Whitepaper
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Manually granting access to entitlements and access reviews is not easy. Organizations are shifting focus towards learning and discovering capabilities. Automation tools such as policy mining are...
Learn more
Event Recording
Event Recording
Three Years is a Long Time in Identity
Landing in a new organisation with a declared objective to transform the way customer identity was done but no mandate was daunting. Being able to look back three years later and tick of an...
Learn more
Evolveum MidPoint 4.8 Release
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Why You Shouldn’t Just Use IGA for Third Party Access Management
Video
Why You Shouldn’t Just Use IGA for Third Party Access Management
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity...
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance...
Beyond Just SAP: The Need for Cross-LoB Access Controls
Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
In this webinar, you’ll learn about The changing landscape of LoB applications and how to tackle the access-related challenges Requirements on modern solutions for access control...
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen...
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access...
Eviden DirX Identity
Executive View
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is...
Access Control Tools for Multi-vendor LoB Environments
Leadership Compass
Access Control Tools for Multi-vendor LoB Environments
This report provides an overview of the market for Access Control Tools for business application environments that are based on applications of multiple vendors but including SAP solutions such as...
Effective Application Access Controls in the Modern Business IT Landscape
Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls...
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
Analyst Chat
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
In the episode of the KuppingerCole Analyst Chat series, Martin Kuppinger and host Matthias engage in a detailed discussion about the challenges associated with the integration of Identity...
Simplify Identity Management With User Centric Personas and PBAC
Webinar Recording
Simplify Identity Management With User Centric Personas and PBAC
Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining...
1 2 3 4 5 6 7 8 9 Next