Identity Governance & Administration (IGA)
Content of Figures
1 How to Use the Buyer’s Compass
This KuppingerCole Buyer’s Compass on CIAM solutions provides information about
- Use Cases
- Functional Selection Criteria
- Non-functional Selecti ...
2 Market Segments Defined
Identity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets. Where ...
Regarding scalability and performance, increasing the IT landscape for organizations, IGA deployments can quickly go under stress to perform better in ...
Login Free 30-day Select Access Get full Access3 Top Use Cases
Use Case | Description |
---|---|
Identity Lifecycle Management (ILM) Focused | Some IGA vendors, such as new entrants into the IGA market, focu ... |
4 Top 20 Selection Criteria - Functional
IAM leaders must perform a detailed evaluation and assessment of Identity Governance & Administration (IGA) providers. The functional selection criter ...
Login Free 30-day Select Access Get full Access5 Top 10 Selection Criteria – Non-functional
Aside from the functional selection criteria listed above, there are a number of non-functional criteria to take into account when deciding on an appr ...
Login Free 30-day Select Access Get full Access6 Use Cases / Selection Criteria Matrix
Having identified the essential use cases and selection criteria for Identity Governance & Administration (IGA) vendors, this section provides a matri ...
These criteria need to be adapted to your business and operational requirements. KuppingerCole Advisory Services can support organizations with adapti ...
Login Free 30-day Select Access Get full Access7 Top 5 Prerequisites - Technical
Even if you transition from an on-premises Identity Governance & Administration (IGA) deployment to an IDaaS approach, you will still need to carefull ...
Login Free 30-day Select Access Get full Access8 Top 10 Prerequisites - Organizational
A successful Identity Governance & Administration (IGA) vendor selection depends on more than the technology itself, and organizational factors should ...
Login Free 30-day Select Access Get full Access9 Top 10 Questions to ask the Vendors
In addition to asking about specific features, other questions are worth asking vendors. The following questions help in understanding the maturity of ...
Login Free 30-day Select Access Get full Access10 Related Research
Advisory Note: Redefining Access Governance - Beyond annual recertification – 72579
Advisory Note: KRIs and KPI for Access Governance – 72559
Advisory Note: Maturity Level Matrixes for Identity and Access - 70738
Architecture Blueprint: Access Governance and Privilege Management – 79045
Leadership Brief: Recommendations for aligning ITSM with IAM/IGA – 80262
Leadership Brief: Typical Risks and Pitfalls for IGA Projects - 72580
Leadership Compass: Infrastructure as a Service - 80035
Leadership Compass: Access Governance – 80098
Leadership Compass: IDaaS Access Management – 79016
Leadership Compass: Identity as a Service (IDaaS) IGA – 80051
Leadership Compass: Identity Governance & Administration (IGA) - 80063
Leadership Compass: Identity Provisioning - 71139
Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance, and Federation (IDaaS B2E) – 70319