Identity and Cybersecurity Glossary

Explore our Identity and Cybersecurity glossary. Find extensive explanations and real-life examples of key concepts in Identity Governance and Administration (IGA) and Identity and Access Management (IAM).

Dive into topics such as risk management, data protection, and compliance standards. Our glossary is a valuable resource for anyone interested in expanding their knowledge in the ever-evolving field of identity and cybersecurity.

Explore Glossary Terms

Access Certification

Access Certification is a process where an auditor verifies that users have access only to the data, resources, and applications...

What is Access Certification?

Access Governance

Access governance ensures secure, compliant user access to IT resources, enhancing efficiency and reducing risks in modern IGA solutions.

What is Access Governance?

Access Management

Access Management in IGA systems involves documented processes that control user access rights, ensuring compliance with security policies and regulations.

What is Access Management?

Access Request

An Access Request is a user-initiated activity to gain permission for accessing resources within an IT infrastructure, enhancing security and...

What is an Access Request?

Access Risk

Access Risk in refers to the potential threats to identity security that emerge because of improper or excessive access to...

What is an Access Risk?

Access Risk Management

Access Risk Management involves the identification, evaluation and mitigation of risks associated with user access to systems, applications, and data...

What is Access Risk Management?

Active Directory

Active Directory is a Microsoft LDAP used to manage users, devices, applications, and resources within a network.

What is Active Directory?

Adaptive Authentication

Adaptive Authentication verifies user identity by evaluating contextual factors and risk during login attempts, enhancing security dynamically.

What is Adaptive Authentication?

Application Access Governance

Application Access Governance manages, monitors, and secures user access to applications, ensuring appropriate access and minimizing risks.

What is Application Access Governance?

Application Governance

Application Governance refers to the processes, policies, and tools to secure, manage, and optimize applications within IT infrastructures.

What is Application Governance?

Authentication

Authentication verifies user identity to secure access. Learn about MFA, SSO, and more to enhance security and compliance.

What is Authentication?

Authorization

Authorization in IGA grants or denies access to resources based on policies, roles, or permissions, determining user actions post-authentication.

What is Authorization?

Certification Campaign

A Certification Campaign refers to the systematic process that organizations use to ensure user access rights and permissions are accurate,...

What is a Certification Campaign?

Cloud Identity Management

Cloud Identity Management centralizes user credentials, roles, and permissions to secure access to cloud-based applications and resources.

What is Cloud Identity Management?

Cloud Identity Security

Cloud Identity Security ensures secure user access to cloud resources, protecting data and applications from unauthorized access.

What is Cloud Identity Security?

Cloud Infrastructure Entitlement Management

Cloud Infrastructure Entitlement Management (CIEM) manages and controls user identities, access permissions, and entitlement privileges in cloud environments.

What is Cloud Infrastructure Entitlement Management?