Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Learn more
Executive View
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
Learn more
Event Recording
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
Learn more
Omada Identity Suite
Executive View
Omada Identity Suite
Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automation or providing...
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
Blog
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital...
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Blog
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial...
The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance
Webinar Recording
The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance
Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across...
Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E)
Leadership Compass
Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E)
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid...
Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben
Webinar Recording
Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben
Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender...
Migrating away from your current Identity Provisioning solution
Webinar Recording
Migrating away from your current Identity Provisioning solution
KuppingerCole Webinar recording
Is there still a need for keeping Identity Provisioning and Access Governance separate?
Blog
Is there still a need for keeping Identity Provisioning and Access Governance separate?
When looking at the core IAM (Identity and Access Management) market with its main product categories of Identity Provisioning and Access Governance, some customers and vendors currently raise the...
Entitlement & Access Governance – the next generation of core IAM
Blog
Entitlement & Access Governance – the next generation of core IAM
In my new report “ Entitlement & Access Governance ”, published yesterday, I introduce a new term and abbreviation: EAG for Entitlement & Access Governance. Thanks to Dave Kearns for...
Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning
Webinar Recording
Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning
KuppingerCole Webinar recording
Enterprise Role Management Done Right: Building the Bridge Between Business and IT
Webinar Recording
Enterprise Role Management Done Right: Building the Bridge Between Business and IT
KuppingerCole Webinar recording
Entitlement Management – has it really been an academic exercise?
Blog
Entitlement Management – has it really been an academic exercise?
Recently I read a blog post from my appreciated and well known analyst colleague Kevin Kampman at Gartner Group talking about entitlement management. That post had some points which made me...