Identity and Cybersecurity Glossary

Explore our Identity and Cybersecurity glossary. Find extensive explanations and real-life examples of key concepts in Identity Governance and Administration (IGA) and Identity and Access Management (IAM).

Dive into topics such as risk management, data protection, and compliance standards. Our glossary is a valuable resource for anyone interested in expanding their knowledge in the ever-evolving field of identity and cybersecurity.

Explore Glossary Terms

Adaptive Authentication

Adaptive Authentication verifies user identity by evaluating contextual factors and risk during login attempts, enhancing security dynamically.

What is Adaptive Authentication?

Access Certification

Access Certification is a process where an auditor verifies that users have access only to the data, resources, and applications...

What is Access Certification?

Access Governance

Access governance ensures secure, compliant user access to IT resources, enhancing efficiency and reducing risks in modern IGA solutions.

What is Access Governance?

Access Management

Access Management in IGA systems involves documented processes that control user access rights, ensuring compliance with security policies and regulations.

What is Access Management?

Access Request

An Access Request is a user-initiated activity to gain permission for accessing resources within an IT infrastructure, enhancing security and...

What is an Access Request?

Access Risk Management

Access Risk Management involves the identification, evaluation and mitigation of risks associated with user access to systems, applications, and data...

What is Access Risk Management?

Application Access Governance

Application Access Governance manages, monitors, and secures user access to applications, ensuring appropriate access and minimizing risks.

What is Application Access Governance?

Application Governance

Application Governance refers to the processes, policies, and tools to secure, manage, and optimize applications within IT infrastructures.

What is Application Governance?

Cloud Infrastructure Entitlement Management

Cloud Infrastructure Entitlement Management (CIEM) manages and controls user identities, access permissions, and entitlement privileges in cloud environments.

What is Cloud Infrastructure Entitlement Management?

Customer Identity and Access Management

Customer Identity and Access Management (CIAM) manages and secures customer identities, providing secure, seamless, and personalized user experiences.

What is Customer Identity and Access Management?

Extended Access Management

Extended Access Management secures and manages access to systems, applications, and data in hybrid IT environments, including on-premises, cloud, and...

What is Extended Access Management?

Federated Identity

Federated Identity allows users to access multiple systems with one set of credentials, enabling seamless access across organizations

What is Federated Identity?

Identity as a Service (IDaaS)

Identity as a Service (IDaaS) is a cloud-based solution for managing digital identities and access to applications, services, and resources.

What is Identity as a Service (IDaaS)?

Identity Analytics

Identity Analytics provides actionable intelligence on user access and behavior, enhancing security and compliance in IT infrastructure.

What is Identity Analytics?

Identity and Access Management

Identity and Access Management (IAM) ensures secure access to systems and data, maintaining confidentiality, integrity, and compliance.

What is Identity and Access Management?

Identity Lifecycle Management

Identity Lifecycle Management manages user, machine, and AI identities within organizations, ensuring secure access throughout their lifecycle.

What is Identity Lifecycle Management?