This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…
Archives
-
Why Identity Automation Fails at 96% of Organizations
This blog was originally published by Cerby here. Enterprise security teams have invested billions in identity security infrastructure over the past decade, building sophisticated systems to manage access and monitor risk. But when it comes to executing identity processes and decisions, our latest research reveals that 96% of organizations still rely on manual workflows. …
-
What is Next-Gen IGA?
Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different? Let’s start with a trip on the way back machine and look at the evolution of these technologies to date. Skipping past the work on e-mail…
-
Six Identity Governance Trends to Follow in 2025
Omada surveyed 502 IT and business leaders responsible for identity governance, access management, compliance, cybersecurity, and general IT administration to uncover the latest trends in identity governance across large organizations. The full results appear in The State of Identity Governance 2025. If you’re looking to strengthen your Identity Governance and Administration (IGA) strategy for 2025…