Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Webinar
Webinar
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Learn more
Blog
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Learn more
Executive View
Executive View
Tenfold Security
IGA (Identity Governance & Administration) is a requirement for any type of organization. Mid-market and medium-sized organizations frequently struggle with the complexity of established IAM...
Learn more
Event Recording
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
Learn more
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
Interview with Robert Byrne
Event Recording
Interview with Robert Byrne
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Event Recording
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Robert Byrne: IGA in the Cloud without Compromise
Event Recording
Robert Byrne: IGA in the Cloud without Compromise
Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity...
David Doret: Improving IAM Success Rates with Rigorous Concepts
Event Recording
David Doret: Improving IAM Success Rates with Rigorous Concepts
IGA in a World of Zero Trust
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
IGA in the Cloud without Compromise
Blog
IGA in the Cloud without Compromise
There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud...
Previous
3 4 5 6 7 8 9 Next