logo
August 20, 2024 | Tyler Reese

Your Guide to Identity Governance and Administration (IGA)

This article explains what IGA is and the benefits it offers. It also clears up some misconceptions about IGA and offers guidance about what to look for when assessing candidate IGA solutions. Download...
July 10, 2024 | Craig Riddell

The Benefits of IAM and RBAC for Securing User Permissions

A vital component of any cybersecurity strategy is robust identity and access management (commonly known by the IAM acronym). This article explains the core elements of an effective IAM implementation and their benefits. Then, it takes a deeper dive into one of those components, role-based access...
January 16, 2023 | Jean Christophe Clement

Getting Started with Identity Governance and Administration

Identity governance and administration (IGA) helps organizations give each person the right access to the right IT resources, at the right time and for the right reasons. Let's take a look at 6 core best practices for successfully implementing IGA, as well as some tips for choosing the right...
May 8, 2018 | Jeff Melnick

RSA Conference 2018: Top 5 Pieces of Advice for CISOs

As expected, the 27th RSA Conference in April 2018 was one of the major IT security events of the year. 650 exhibitors and 45,000 security professionals came together in San Francisco's Moscone Center to elaborate on the state of the art and the future of cyber security. Over 500 sessions...
...