PinnedSameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to UARs-I: Why do we need User Access Reviews?User access reviews. You know the drill. Ever so often, you’ve got to go through and review every single user’s access to make sure they…4 min read·Oct 14, 2022--1--1
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide: How an effective IGA program can save money, time, and resourcesI. Introduction4 min read·Feb 4, 2023----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide: How do we shift left on Identity Governance?Introduction4 min read·Feb 1, 2023----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide: Where does SaaS identity governance fit into the cloud security paradigm?I. Introduction5 min read·Dec 8, 2022----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to CIEM-II: How does CIEM fit into Cloud Security?I. Introduction4 min read·Nov 30, 2022----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to CIEM-I: What is Cloud Infrastructure Entitlement Management?I. Introduction4 min read·Nov 16, 2022----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to IGA-II: How does Identity Governance and Administration differ from IAM?I. Introduction4 min read·Nov 10, 2022----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to IGA-I: What is Identity Governance and Administration?I. Introduction5 min read·Nov 2, 2022----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to UARs-III: How can we make User Access Reviews more effective?I. Introduction4 min read·Oct 26, 2022----
Sameer SaitinBalkanID Intelligent IGA BlogA CISOs guide to UARs-II: What type of control is a User Access Review?User Access Review Controls5 min read·Oct 20, 2022----