Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Learn more
Executive View
Executive View
Atos DirX Audit
DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can analyze concrete...
Learn more
Event Recording
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
Learn more
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Event Recording
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
David Doret: Improving IAM Success Rates with Rigorous Concepts
Event Recording
David Doret: Improving IAM Success Rates with Rigorous Concepts
IGA in a World of Zero Trust
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
IGA in the Cloud without Compromise
Blog
IGA in the Cloud without Compromise
There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud...
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
Event Recording
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
With 77 percent of the world’s transaction revenue touching SAP ERP systems, these crown jewels have long been the prime target for cybercrime and internal threats due to Separation of...
Accelerate your Identity's Digital Transformation
Interview
Accelerate your Identity's Digital Transformation
Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
Event Recording
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market,...
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Event Recording
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Stephanie van der Loos: Seamless Employee Access Lifecycle
Event Recording
Stephanie van der Loos: Seamless Employee Access Lifecycle