Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
The Right Foundation for Your Identity Fabric
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of Identity Fabrics, on what to consider when defining the own approach for an...
Learn more
Blog
Blog
Enhancing Zero Trust in a ServiceNow Environment
Zero Trust has been established as the guiding principle for cybersecurity. The “don’t trust, always verify” approach stands for methods that don’t rely only on singular security tools, such as the...
Learn more
Executive View
Executive View
Ping Identity’s PingFederate
PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS...
Learn more
Webinar Recording
Webinar Recording
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der...
Learn more
Effective Application Access Controls in the Modern Business IT Landscape
Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls...
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
Analyst Chat
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
In the episode of the KuppingerCole Analyst Chat series, Martin Kuppinger and host Matthias engage in a detailed discussion about the challenges associated with the integration of Identity...
Simplify Identity Management With User Centric Personas and PBAC
Webinar Recording
Simplify Identity Management With User Centric Personas and PBAC
Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining...
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Whitepaper
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Manually granting access to entitlements and access reviews is not easy. Organizations are shifting focus towards learning and discovering capabilities. Automation tools such as policy mining are...
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Event Recording
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Imagine a world where security risks are identified and mitigated before they even happen. Imagine if access and auditing recommendations were made with the precision of a computer algorithm....
Machine Learning in IAM & IGA
Event Recording
Machine Learning in IAM & IGA
This presentation will provide an overview of the terminology and basics of AI and ML in the context of Identity and Access Management (IAM) and Identity Governance and Administration (IGA). It...
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Event Recording
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem...
Entitlements - Claim vs. Reality
Event Recording
Entitlements - Claim vs. Reality
The claim or desire for authorizations, permissions and the rights set in practice often have a wide divergence. Typically, more rights are assigned unconsciously than were actually required....
IGA Everywhere - Creating your Future Security Ecosystem
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
Market Overview: Identity Governance & Administration (IGA)
Event Recording
Market Overview: Identity Governance & Administration (IGA)
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly...
Three Years is a Long Time in Identity
Event Recording
Three Years is a Long Time in Identity
Landing in a new organisation with a declared objective to transform the way customer identity was done but no mandate was daunting. Being able to look back three years later and tick of an...