The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static entitlements for systems and applications fall short in really securing the data at risk. They fail in managing data in motion. They are static. They don’t manage the usage of data well. Not to speak of all the challenges in role management projects and around regular access reviews.

Language: English • Duration: 51:34 • Resolution: 1280x720

Learn more about this webinar