Identity Governance Blog

A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom

Identity Governance Blog

What Trick or Treating Teaches Us About Requesting and Granting Access
What Trick or Treating Teaches Us About Requesting and Granting Access

Requesting access can be trick or treat. Without an integrated platform end users waste time and organizations can create security blindspots.

Learn more 4 min read
Learn more
A Layered Approach to Security: MFA, SSO, and IGA
A Layered Approach to Security: MFA, SSO, and IGA

While MFA and SSO help grant trust to users and applications, there are things that IGA brings to the table that not only improve security but also help with compliance and efficiency.

Learn more 4 min read
Learn more
How to be a Good Guest in Azure AD
How to be a Good Guest in Azure AD

Azure guest accounts enable any organization using Azure AD to work safely and securely with users from other organizations. Get insights on how to control these accounts without hindering productivity.

Learn more 4 min read
Learn more
Identity Governance for all identities, everywhere
Identity Governance for all identities, everywhere

Identity Governance is a critical and strategic part of any IAM program. Read the blog to learn more about identity governance, how to avoid pitfalls and benefit from best practices.

Learn more 5 min read
Learn more
October is Cybersecurity Awareness Month
October is Cybersecurity Awareness Month

The theme for this year is to ‘see yourself in cyber', underlying that each person has a key role to play in keeping attackers at bay. Read the blog to learn more.

Learn more 4 min read
Learn more
The Importance of Certifying Access with Regularity
The Importance of Certifying Access with Regularity

Read the blog to learn why regular access certification is so important for organizations and how to build and manage successful access certification campaigns.

Learn more 4 min read
Learn more
Role-Based Access Control: Why You Need It
Role-Based Access Control: Why You Need It

Read the blog to learn what is role-based access control (RBAC), how it works, its benefits, examples, and best practices.

Learn more 7 min read
Learn more
3 Types of Access Control: Which is Right for Your Business?
3 Types of Access Control: Which is Right for Your Business?

There are 3 main types of access control: RBAC, ABAC and PBAC. Read the blog to learn about the pros and cons of each access control type.

Learn more 6 min read
Learn more
The American Data Privacy and Protection Act: A Primer
The American Data Privacy and Protection Act: A Primer

The American Data Privacy and Protection Act (ADPPA) is now ready for a full vote. Learn what is in the bill, what it means for companies, and how can an Identity Governance and Administration (IGA) solution help meet ADPPA requirements.

Learn more
Learn more
What is Data Leakage? And Other Pressing Questions
What is Data Leakage? And Other Pressing Questions

Data leakage is a term we hear about all the time. But what does data leakage mean? Find here answers to several key questions about data leaks, and what can be done to prevent them.

Learn more 5 min read
Learn more
7 Lessons Learned from the Twitter Whistleblower
7 Lessons Learned from the Twitter Whistleblower

Key lessons learned and suggestions for what organizations can do to make sure they adhere to security and compliance best practices.

Learn more 4 min read
Learn more
The Need for Configurable Connectivity
The Need for Configurable Connectivity

Today’s enterprises have, on average, 288 different SaaS apps in production, and this number only figures to increase. Read how identity governance and administration (IGA) helps manage the communication between applications and ensures that they can be securely utilized.

Learn more 3 min read
Learn more
1 2 3 6

Let's Get
Started

Let us show you how Omada can enable your business.