Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Learn more
Executive View
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
Learn more
Webinar Recording
Webinar Recording
IGA and LoB Application Access Management: What We’ll See in 2024
In this webinar, you will learn about The current state of IGA and Application Access Management convergence Trends impacting these areas: Generative AI, Risk Based Access Controls,...
Learn more
Insights of A CISO: Interview with Dr. Ralf Schneider
Event Recording
Insights of A CISO: Interview with Dr. Ralf Schneider
Pooja Agrawalla: Are You Building a Legacy IGA?
Event Recording
Pooja Agrawalla: Are You Building a Legacy IGA?
Flemming Hartwich: IGA - the Right Place for Identities?
Event Recording
Flemming Hartwich: IGA - the Right Place for Identities?
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Event Recording
Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom
Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you...
Where to Start Your IAM Modernization Journey
Video
Where to Start Your IAM Modernization Journey
Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at...
IAM Essentials: Lifecycle Management
Essentials
IAM Essentials: Lifecycle Management
IAM Essentials: Identity Governance and Administration
Essentials
IAM Essentials: Identity Governance and Administration
Workforce Continuity in a Time of Crisis
Webinar Recording
Workforce Continuity in a Time of Crisis
It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal...
The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance
Webinar Recording
The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance
Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across...
Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben
Webinar Recording
Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben
Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender...
Migrating away from your current Identity Provisioning solution
Webinar Recording
Migrating away from your current Identity Provisioning solution
KuppingerCole Webinar recording
Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning
Webinar Recording
Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning
KuppingerCole Webinar recording