Viresh Garg, CISSP, CCSP, CISM, CISAThe Top 7 Cybersecurity Controls for SOX ComplianceSpecific recomendations for small, medium, large and Fortune 500 companiesAug 20
Khalid HussainSailPoint IdentityIQ (IIQ 8.3/8.4) Installation Guide: A Step-by-Step WalkthroughLearn how to install SailPoint IdentityIQ with this easy-to-follow guide. Get started with identity governance today!May 61
Manoj KumarUnpacking Machine Learning for Access GovernanceAnyone who has spent some time on Identity and Access Management programmes would have confronted the challenge of designing and mining…Jul 311Jul 311
InNovai-Cybersecurity 101byNova NovriansyahImplementing Identity Governance and Administration (IGA): A Comprehensive GuideIn today’s digital age, managing identities and access within an organization has become a critical component of maintaining security and…Jul 22Jul 22
InNovai-Cybersecurity 101byNova NovriansyahUser Account Management Policy Example based on IGA1. PurposeJul 22Jul 22
Viresh Garg, CISSP, CCSP, CISM, CISAThe Top 7 Cybersecurity Controls for SOX ComplianceSpecific recomendations for small, medium, large and Fortune 500 companiesAug 20
Khalid HussainSailPoint IdentityIQ (IIQ 8.3/8.4) Installation Guide: A Step-by-Step WalkthroughLearn how to install SailPoint IdentityIQ with this easy-to-follow guide. Get started with identity governance today!May 61
Manoj KumarUnpacking Machine Learning for Access GovernanceAnyone who has spent some time on Identity and Access Management programmes would have confronted the challenge of designing and mining…Jul 311
InNovai-Cybersecurity 101byNova NovriansyahImplementing Identity Governance and Administration (IGA): A Comprehensive GuideIn today’s digital age, managing identities and access within an organization has become a critical component of maintaining security and…Jul 22
InNovai-Cybersecurity 101byNova NovriansyahUser Account Management Policy Example based on IGA1. PurposeJul 22
suman sahaCreate Entitlement Management packages via Graph ApiGraph api requires EntitlementManagement.ReadWrite.All permission to create catalog, connected organization, access package, etc.Mar 20, 2023
John RobertsonIdentity Crisis: Tackling the Growing Complexity of IAMIntegrated Digital Identity and Access ManagementFeb 26
OpenIAM Technical BlogDelegation options in OpenIAMIdentity governance workflows require the ability to delegate approval permissions. This article describes the delegation options in…May 15, 2022