Identity Governance Blog

A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom

Identity Governance Blog

International Women’s Day Spotlight: Anna Nordström
International Women’s Day Spotlight: Anna Nordström

I feel fortunate that I get to work with so many ambitious, creative, and passionate people.

Learn more 3 min read
Learn more
Artificial Intelligence, it’s a Matter of Trust
Artificial Intelligence, it’s a Matter of Trust

Read about the three key lessons that can be applied to any identity management program stemming from the ChatGPT phenomenon.

Learn more 4 min read
Learn more
An Interview with Omada Developer, Michal Czajkowski
An Interview with Omada Developer, Michal Czajkowski

Michal Czajkowski, a Developer at Omada, talks about his career at Omada and what it means to him to be an Omadian.

Learn more 3 min read
Learn more
My Journey at Omada – Mads Peitersen
My Journey at Omada – Mads Peitersen

Mads Peitersen, Principal Customer Success Manager & Solutions Architect at Omada, shares his career path and what it means to him to be an Omadian.

Learn more 3 min read
Learn more
Twitter Reminds us why Deprovisioning Access is so Important
Twitter Reminds us why Deprovisioning Access is so Important

When working to offboard workers, creating a standard process for deprovisioning is critical to avoid security risks and maintain compliance.

Learn more 4 min read
Learn more
What Trick or Treating Teaches Us About Requesting and Granting Access
What Trick or Treating Teaches Us About Requesting and Granting Access

Requesting access can be trick or treat. Without an integrated platform end users waste time and organizations can create security blindspots.

Learn more 4 min read
Learn more
A Layered Approach to Security: MFA, SSO, and IGA
A Layered Approach to Security: MFA, SSO, and IGA

While MFA and SSO help grant trust to users and applications, there are things that IGA brings to the table that not only improve security but also help with compliance and efficiency.

Learn more 4 min read
Learn more
How to be a Good Guest in Azure AD
How to be a Good Guest in Azure AD

Azure guest accounts enable any organization using Azure AD to work safely and securely with users from other organizations. Get insights on how to control these accounts without hindering productivity.

Learn more 4 min read
Learn more
What is Identity Governance
What is Identity Governance

Identity Governance is a critical and strategic part of any IAM program. Read the blog to learn more about identity governance, how to avoid pitfalls and benefit from best practices.

Learn more 5 min read
Learn more
October is Cybersecurity Awareness Month
October is Cybersecurity Awareness Month

The theme for this year is to ‘see yourself in cyber', underlying that each person has a key role to play in keeping attackers at bay. Read the blog to learn more.

Learn more 4 min read
Learn more
The Importance of Certifying Access with Regularity
The Importance of Certifying Access with Regularity

Read the blog to learn why regular access certification is so important for organizations and how to build and manage successful access certification campaigns.

Learn more 4 min read
Learn more
Role-Based Access Control: Why You Need It
Role-Based Access Control: Why You Need It

Read the blog to learn what is role-based access control (RBAC), how it works, its benefits, examples, and best practices.

Learn more 7 min read
Learn more
1 2 3 7

Let's Get
Started

Let us show you how Omada can enable your business.