Identity Governance Blog

A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom

Identity Governance Blog

Automated Provisioning: Process & Benefits Explained
Automated Provisioning: Process & Benefits Explained

Discover how automated provisioning functions, its main benefits, and why it’s essential for fast, secure resource management in today’s IT landscape.

Learn more
Learn more
Survey Reveals These Three Features Drive Efficiency in IGA Solutions
Survey Reveals These Three Features Drive Efficiency in IGA Solutions

Learn why IT and business leaders identify adaptability, connectivity, and automation as essential features when evaluating a modern IGA solution.

Learn more
Learn more
IAM Compliance – Tips for Staying Ahead of Regulations in 2025
IAM Compliance – Tips for Staying Ahead of Regulations in 2025

Avoid fines and stay ahead of IAM compliance regulations like GDPR, DORA, CMMC 2.0, NYCRR 500, NIS2, SOX, NIST CSF 2.0, PCI DSS, HIPAA, and ISO 27001.

Learn more
Learn more
How to Choose an IGA Investment Strategy that Drives Real Efficiency
How to Choose an IGA Investment Strategy that Drives Real Efficiency

Organizations constantly work to make IGA less error-prone and time consuming. Learn about an approach most likely to achieve real, sustainable efficiency.

Learn more
Learn more
Key Strategies for Managing Third-Party Risk Under DORA
Key Strategies for Managing Third-Party Risk Under DORA

Learn about and explore concrete actionable strategies for effectively managing ICT third-party risk (TPR) under the guidelines of DORA.

Learn more
Learn more
How Modern IGA Supports the Codification of Zero Trust Cybersecurity Standards
How Modern IGA Supports the Codification of Zero Trust Cybersecurity Standards

As Zero Trust Security Model mandates like AB 749 take hold in state agencies, learn how a modern IGA solution cost effectively closes the compliance gap.

Learn more
Learn more
Using Generative AI for Identity and Access Management: Tips and Tricks
Using Generative AI for Identity and Access Management: Tips and Tricks

See how organizations are integrating Generative AI into IAM tools to make identity governance tasks more intuitive and less resource intensive.

Learn more
Learn more
Engaging Stakeholders in IGA: Key Insights from the Benelux User Group
Engaging Stakeholders in IGA: Key Insights from the Benelux User Group

During a recent Benelux User Group session and roundtable that Omada hosted on “Stakeholder Involvement,” several important points came to light that can help organizations raise awareness of IGA’s value, secure leadership support, and motivate the broader business to embrace these solutions.

Learn more
Learn more
How AI Is Impacting Identity and Access Management (IAM)
How AI Is Impacting Identity and Access Management (IAM)

Discover how AI is revolutionizing Identity and Access Management (IAM) with intelligent monitoring, NLP interfaces, and generative AI applications.

Learn more
Learn more
Auguste Dumpyte: Breaking Boundaries as a Scrum Master at Omada
Auguste Dumpyte: Breaking Boundaries as a Scrum Master at Omada

This International Women’s Day, we’re spotlighting Auguste Dumpyte, a dedicated Scrum Master here at Omada

Learn more
Learn more
Veselina Korshunova: Pioneering Marketing, Tech, and Cybersecurity
Veselina Korshunova: Pioneering Marketing, Tech, and Cybersecurity

Women’s Day is a time to recognize the achievements of women around the world, and at Omada, we are proud to highlight Veselina Korshunova—an accomplished marketing professional whose journey from Bulgaria to Denmark led her into the forefront of technology and cybersecurity.

Learn more
Learn more
Jenny Mulcahy: Embracing Adaptability and Driving Innovation in Identity Security
Jenny Mulcahy: Embracing Adaptability and Driving Innovation in Identity Security

This International Women’s Day, we’re shining a light on one of our newest colleagues at Omada, Jenny Mulcahy, who is a seasoned professional with deep expertise in identity and cybersecurity.

Learn more
Learn more
1 2 3 12

Let's Get
Started

Let us show you how Omada can enable your business.