Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Learn more
Advisory Note
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Learn more
Event Recording
Event Recording
Joakim Hardell: Cloud Strategy vs. National Security. Telia's Road to IGA Systems Modernization
We will give you a sneak peek on Telia Company’s current journey towards IGA system modernization. After the presentation you will have a good overview and some insight in what is cooking...
Learn more
SAP IDM End of Life: Die IGA-Migration souverän meistern
Webinar Recording
SAP IDM End of Life: Die IGA-Migration souverän meistern
KuppingerCole Lead Advisor Dr. Phillip Messerschmidt wird die Besonderheiten im SAP-Umfeld und SAP- IdM in einem kurzen Überblick beleuchten. Außerdem wird er aufzeigen,...
IGA and LoB Application Access Management: What We’ll See in 2024
Webinar Recording
IGA and LoB Application Access Management: What We’ll See in 2024
In this webinar, you will learn about The current state of IGA and Application Access Management convergence Trends impacting these areas: Generative AI, Risk Based Access Controls,...
Modernizing IGA: A Guide for IAM Leaders
Webinar Recording
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Evolveum MidPoint 4.8 Release
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Why You Shouldn’t Just Use IGA for Third Party Access Management
Video
Why You Shouldn’t Just Use IGA for Third Party Access Management
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity...
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance...
Beyond Just SAP: The Need for Cross-LoB Access Controls
Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
In this webinar, you’ll learn about The changing landscape of LoB applications and how to tackle the access-related challenges Requirements on modern solutions for access control...
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen...
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access...
Eviden DirX Identity
Executive View
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is...
Access Control Tools for Multi-vendor LoB Environments
Leadership Compass
Access Control Tools for Multi-vendor LoB Environments
This report provides an overview of the market for Access Control Tools for business application environments that are based on applications of multiple vendors but including SAP solutions such as...
1 2 3 4 5 6 7 8 9 Next