Insights

Identity Governance and Administration

Identity Governance and Administration is a core component of IAM infrastructure and refers to integrated solutions that combine Identity Lifecycle Management and Access Governance. IGA helps to cut costs, increase security, improve compliance, and give users access to the IT resources they need.

Guide
Guide
Identity Governance and Administration – A Policy-Based Primer for Your Company
A policy-based IGA guide for your business. From definition to implementation, learn how automation can reduce costs and free up IT staff.
Learn more
KC Open Select
KC Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Learn more
Blog
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Learn more
Executive View
Executive View
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is...
Learn more
Webinar Recording
Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls...
Learn more
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Event Recording
Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
Event Recording
Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge
David Doret: Improving IAM Success Rates with Rigorous Concepts
Event Recording
David Doret: Improving IAM Success Rates with Rigorous Concepts
IGA in a World of Zero Trust
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
IGA in the Cloud without Compromise
Blog
IGA in the Cloud without Compromise
There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud...
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
Event Recording
Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective
With 77 percent of the world’s transaction revenue touching SAP ERP systems, these crown jewels have long been the prime target for cybercrime and internal threats due to Separation of...
Accelerate your Identity's Digital Transformation
Interview
Accelerate your Identity's Digital Transformation
Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
Event Recording
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market,...
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Event Recording
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Stephanie van der Loos: Seamless Employee Access Lifecycle
Event Recording
Stephanie van der Loos: Seamless Employee Access Lifecycle