Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Learn more
Leadership Compass
Leadership Compass
Access Control Tools for Multi-vendor LoB Environments
This report provides an overview of the market for Access Control Tools for business application environments that are based on applications of multiple vendors but including SAP solutions such as...
Learn more
Event Recording
Event Recording
Flemming Hartwich: IGA - the Right Place for Identities?
Learn more
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Delegated Administration as a Solution for B2B Use Cases
Whitepaper
Delegated Administration as a Solution for B2B Use Cases
In an emerging digital world, cross-company collaboration is part of day-to-day business. Partner networks are growing at a dramatic pace, making antiquated approaches to managing partner...
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA
Webinar Recording
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA
Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of...
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Webinar Recording
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der...
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
Webinar Recording
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM...
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Robert Byrne: IGA in the Cloud without Compromise
Event Recording
Robert Byrne: IGA in the Cloud without Compromise
Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity...
Interview with Robert Byrne
Event Recording
Interview with Robert Byrne
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Event Recording
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge