Blog

A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom

Protect or Pay – Solid Access Management is Never Too Late to Implement

Incidents at well-known companies such as British Airways, SunTrust or Yahoo! – just to name a few – are still making headlines, but the majority of attacks and their impact remain largely unnoticed. 

By Dr. Martin Kuhlmann, VP Global Presales

Read More

11 Steps to Prevent Insider Threats Using Identity and Access Management

Many organizations are still neglecting the insider threat, despite this threat source being recognized as one of the root causes of data beaches. Read our tips for preventing insider threats and keeping your organization secure. 

Read More

The Renaissance of Role-Based Access Control

It is complex, time-consuming and inefficient to manage access rights for thousands of users across an organization manually, while still trying to retain consistency across various systems. With the proper implementation of RBAC, the assignment of access rights becomes systematic and repeatable.
Read More

Tech Insight: Why Reconciliation Is Essential in Access Governance

Automated processes for the comparison and alignment of actual access data in IT systems with the desired permissions, also known as reconciliation, is an essential aspect of identity management and access governance.

By Dr. Martin Kuhlmann, VP Global Presales

Read More
1 2 3