Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
Webinar
Webinar
Simplify Identity Management With User Centric Personas and PBAC
As customers, employees, partners, suppliers, and other parties become increasingly intertwined, companies face the challenge of managing access for multiple overlapping identities, leading to...
Learn more
Blog
Blog
Enhancing Zero Trust in a ServiceNow Environment
Zero Trust has been established as the guiding principle for cybersecurity. The “don’t trust, always verify” approach stands for methods that don’t rely only on singular security tools, such as the...
Learn more
Executive View
Executive View
Omada Identity Cloud
Omada Identity Cloud is an IDaaS (Identity-as-a-Service) solution focusing on IGA (Identity Governance & Administration) capabilities. It supports all relevant areas such as User Lifecycle...
Learn more
Event Recording
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Learn more
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Whitepaper
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Manually granting access to entitlements and access reviews is not easy. Organizations are shifting focus towards learning and discovering capabilities. Automation tools such as policy mining are...
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Event Recording
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem...
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
Machine Learning in IAM & IGA
Event Recording
Machine Learning in IAM & IGA
This presentation will provide an overview of the terminology and basics of AI and ML in the context of Identity and Access Management (IAM) and Identity Governance and Administration (IGA). It...
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Event Recording
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Imagine a world where security risks are identified and mitigated before they even happen. Imagine if access and auditing recommendations were made with the precision of a computer algorithm....
Better Safe than Sorry: A Peek into the Future with IGA
Event Recording
Better Safe than Sorry: A Peek into the Future with IGA
Engineers across organizations struggle with increased anxiety and stress every time they hit the push button to make complex system changes. One mistake can hinder business as usual, introduce...
Policy-Driven IGA – Why This Approach Produces Better Outcomes
Event Recording
Policy-Driven IGA – Why This Approach Produces Better Outcomes
IGA activities in organizations have largely been around defining access policies manually, configuring access request workflows and scheduling periodic access reviews.  Such activities...
SAP Transformation and IGA
Event Recording
SAP Transformation and IGA
Various large organizations typically have invested heavily in SAP as well as IGA. There comes a point where the two systems start overlapping functionalities. This session will provide a...
Entitlements - Claim vs. Reality
Event Recording
Entitlements - Claim vs. Reality
The claim or desire for authorizations, permissions and the rights set in practice often have a wide divergence. Typically, more rights are assigned unconsciously than were actually required....
IGA Everywhere - Creating your Future Security Ecosystem
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
1 2 3 4 5 6 7 Next