Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
Learn more
Whitepaper
Whitepaper
Delegated Administration as a Solution for B2B Use Cases
In an emerging digital world, cross-company collaboration is part of day-to-day business. Partner networks are growing at a dramatic pace, making antiquated approaches to managing partner...
Learn more
Webinar Recording
Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
In diesem Webinar lernen Sie: Warum Zugriffskontrollen auch über Systemgrenzen hinweg funktionieren müssen und nicht auf SAP-Systeme beschränkt sein können Wie...
Learn more
Enterprise Role Management Done Right: Building the Bridge Between Business and IT
Webinar Recording
Enterprise Role Management Done Right: Building the Bridge Between Business and IT
KuppingerCole Webinar recording
Integrating Access Governance and Entitlement Management
Webinar Recording
Integrating Access Governance and Entitlement Management
KuppingerCole Webinar recording
Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
Webinar Recording
Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
Kuppinger Cole Webinar recording
Previous
1 2 3 4 5 6