Identity Governance Blog

A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom

Identity Governance Blog

7 Challenges That Prevent Good Access Governance
7 Challenges That Prevent Good Access Governance

Learn how to overcome key challenges that can hamper your access governance efforts and ensure sustainable, effective data access governance.

Learn more 4 min read
Learn more
Cloud Migration
Cloud Migration

Aside from greater reliability and uptime, migrating applications to cloud servers can also improve performance and security. Read our blog to learn how the cloud migration process works, its benefits, challenges, and impact on IGA.

Learn more 11 min read
Learn more
Potential Insider Threat Indicators
Potential Insider Threat Indicators

Understanding potential insider threat indicators enhances the cyber awareness of any organization. Learn how IGA can help mitigate insider threats.

Learn more 7 min read
Learn more
International Women’s Day Spotlight: Anna Nordström
International Women’s Day Spotlight: Anna Nordström

I feel fortunate that I get to work with so many ambitious, creative, and passionate people.

Learn more 3 min read
Learn more
International Women’s Day Spotlight: Ida Nowak
International Women’s Day Spotlight: Ida Nowak

All of the women I work with at Omada are highly motivated, highly intelligent, and eager to make an impact.

Learn more 2 min read
Learn more
Sharing is Caring: Why Delegation is a Key Principle of Any IGA Program
Sharing is Caring: Why Delegation is a Key Principle of Any IGA Program

Delegation is essential to any IAM program, particularly as they scale. Learn how you can benefit by delegating access reviews.

Learn more 4 min read
Learn more
Artificial Intelligence, it’s a Matter of Trust
Artificial Intelligence, it’s a Matter of Trust

Read about the three key lessons that can be applied to any identity management program stemming from the ChatGPT phenomenon.

Learn more 4 min read
Learn more
An Interview with Omada Developer, Michal Czajkowski
An Interview with Omada Developer, Michal Czajkowski

Michal Czajkowski, a Developer at Omada, talks about his career at Omada and what it means to him to be an Omadian.

Learn more 3 min read
Learn more
My Journey at Omada – Mads Peitersen
My Journey at Omada – Mads Peitersen

Mads Peitersen, Principal Customer Success Manager & Solutions Architect at Omada, shares his career path and what it means to him to be an Omadian.

Learn more 3 min read
Learn more
Twitter Reminds us why Deprovisioning Access is so Important
Twitter Reminds us why Deprovisioning Access is so Important

When working to offboard workers, creating a standard process for deprovisioning is critical to avoid security risks and maintain compliance.

Learn more 4 min read
Learn more
What Trick or Treating Teaches Us About Requesting and Granting Access
What Trick or Treating Teaches Us About Requesting and Granting Access

Requesting access can be trick or treat. Without an integrated platform end users waste time and organizations can create security blindspots.

Learn more 4 min read
Learn more
A Layered Approach to Security: MFA, SSO, and IGA
A Layered Approach to Security: MFA, SSO, and IGA

While MFA and SSO help grant trust to users and applications, there are things that IGA brings to the table that not only improve security but also help with compliance and efficiency.

Learn more 4 min read
Learn more
1 2 3 7

Let's Get
Started

Let us show you how Omada can enable your business.