PinnedPublished inBalkanID Intelligent IGA BlogA CISOs guide to UARs-I: Why do we need User Access Reviews?User access reviews. You know the drill. Ever so often, you’ve got to go through and review every single user’s access to make sure they…Oct 14, 20221Oct 14, 20221
Published inBalkanID Intelligent IGA BlogA CISOs guide: How an effective IGA program can save money, time, and resourcesI. IntroductionFeb 4, 2023Feb 4, 2023
Published inBalkanID Intelligent IGA BlogA CISOs guide: How do we shift left on Identity Governance?IntroductionFeb 1, 2023Feb 1, 2023
Published inBalkanID Intelligent IGA BlogA CISOs guide: Where does SaaS identity governance fit into the cloud security paradigm?I. IntroductionDec 8, 2022Dec 8, 2022
Published inBalkanID Intelligent IGA BlogA CISOs guide to CIEM-II: How does CIEM fit into Cloud Security?I. IntroductionNov 30, 2022Nov 30, 2022
Published inBalkanID Intelligent IGA BlogA CISOs guide to CIEM-I: What is Cloud Infrastructure Entitlement Management?I. IntroductionNov 16, 2022Nov 16, 2022
Published inBalkanID Intelligent IGA BlogA CISOs guide to IGA-II: How does Identity Governance and Administration differ from IAM?I. IntroductionNov 10, 2022Nov 10, 2022
Published inBalkanID Intelligent IGA BlogA CISOs guide to IGA-I: What is Identity Governance and Administration?I. IntroductionNov 2, 2022Nov 2, 2022
Published inBalkanID Intelligent IGA BlogA CISOs guide to UARs-III: How can we make User Access Reviews more effective?I. IntroductionOct 26, 2022Oct 26, 2022
Published inBalkanID Intelligent IGA BlogA CISOs guide to UARs-II: What type of control is a User Access Review?User Access Review ControlsOct 20, 2022Oct 20, 2022