Content of Figures
Over the past decade, solutions for Access Governance or IGA (Identity Governance & Administration) have been implemented in many organizations, parti ...Login Free 30-day Select Access Get full Access
- Identify a gap of common IGA solutions when it comes to managing and governing access entitlements at system level
- Understand why governing access ...
3 There’s a gap: The limits of Access Governance
Access Governance is essential – but it is not sufficient, focusing on a rather coarse-grain cross-system view, not on a detailed view on the specif ...
Solutions supporting administrators of such environments, e.g. Windows administrators or SharePoint administrators, commonly are too technical and spe ...Login Free 30-day Select Access Get full Access
4 Adding governance for unstructured data
Data Access Governance tools support the management of unstructured data. However, many of these tools are too technical and most of them are not inte ...Login Free 30-day Select Access Get full Access
5 Key requirements for Governing Access to Unstructured Data
Aside of integration to IGA, there are various other key requirements to Data Governance tools. These tools must go well beyond the administrator focu ...Login Free 30-day Select Access Get full Access
6 The SailPoint approach to comprehensive IGA
SailPoint delivers SecurityIQ as an extension of the SailPoint Open Identity Platform, with tight integration into their IGA flagship product Identity ...
An interesting feature is the Data Owners Dashboard, which gives data owners a condensed overview and drill-down capabilities for “their” data, e. ...Login Free 30-day Select Access Get full Access
7 Action Plan for comprehensive identity governance
There is a strong need for enterprise moving towards an integrated approach for IGA that covers all systems and data. Access Governance capabilities s ...Login Free 30-day Select Access Get full Access