Identity Governance What is Attribute Based Access Control? Attribute-based access control (ABAC) is an authentication and authorization model that uses attributes, rather than roles, to grant user access. Learn more. Video Delivering AI-Driven Identity Governance for Microsoft Platforms Video Fastpath Integration Demo Do No Harm: Safeguarding your Cloud Investments with Identity Management Article Just-in-Time Provisioning & SAML SSO Comparison Solution Brief Integrated Identity Governance and Access Governance Identity and access governance applications serve as tools for technology enablement within an organization’s governance risk and compliance (GRC) strategy. Article What is Automated Provisioning? Automated provisioning grants employees access to tools and applications based on their role and permission levels within an organization. Learn how it works. Video Meet Our New EVP of EMEA, Steve Bradford SailPoint has a new EVP of EMEA, Steve Bradford. View and read our Q&A on why he decided to join SailPoint. Video Identity Management for Modern Healthcare Systems Modern healthcare systems need to manage identity access in a seamless and scalable manner in order to improve caring coordination and operational efficiency. eBook Identity Governance: Selecting the Right Partners Throughout this guide, we have emphasized how identity governance touches every part of an organization. Here we look at how to find the right security partners eBook Identity Governance: Building your Strategic Roadmap An identity governance roadmap can guide you through initial implementation, and provide a basis for adjusting when challenges and opportunities arise. eBook Identity Governance: Identity Governance and the Cloud Identity governance provides a single view of identity and access related data across all applications, including collaborative applications in the cloud. eBook Ultimate Guide to Identity Governance: Identity Governance in Action Our discussion so far about identity governance has been somewhat abstract. Now let’s look at exactly how identity governance can derail cyber attacks. eBook Ultimate Guide to Identity Governance: The Center of Security Today, everyone in IT needs to be concerned about user access privileges. Why? Because compromised identities are arguably the most serious cybersecurity problems. 123Next ›»