Modern IGA

  • Why Identity and Segregation of Duties are The New Perimeter52:01

    Why Identity and Segregation of Duties are The New Perimeter

    IGA experts discuss the evolving security perimeter amid growing applications, remote access, users, and permissions in today’s enterprise environments.

    Watch Video
  • Segregation of Duties16:43

    Segregation of Duties

    This presentation discusses Segregation of Duties risks, real-world failures like the Société Générale scandal, and showcases Zilla’s identity security platform.

    Watch Video
  • Deep dive into service account security11:07

    Deep dive into service account security

    Zilla’s talk explores the hidden risks of service accounts, offering guidance on managing and securing these often-overlooked non-human identities.

    Watch Video
  • Breakthrough Identity Governance Automation39:11

    Breakthrough Identity Governance Automation

    Zilla's tech talk presents AI-driven identity governance automation to streamline access reviews, provisioning, and identity operations.

    Watch Video
  • Incorporating Identity in Your Cloud Security Strategy52:55

    Incorporating Identity in Your Cloud Security Strategy

    Zilla and Guide Point leaders discuss key challenges and strategies for achieving effective identity management in modern cloud environments.

    Watch Video
  • Tackling job appropriate access31:33

    Tackling job appropriate access

    90% of identity leaders struggle with roles—this webinar explores an AI-driven, automated approach to delivering job-appropriate access at scale.

    Watch Video
  • Identity Governance Agony46:05

    Identity Governance Agony

    Zilla leaders and experts share 2025 IGA best practices and insights from a recent market research survey of identity leaders.

    Watch Video
  • Simplifying Access Reviews for Credit Unions Solution Brief

    Simplifying Access Reviews for Credit Unions Solution Brief

    CA - IGA for Credit Unions

    Read More
  • 2025 State of IGA Survey Report

    2025 State of IGA Survey Report

    Most organizations still rely on manual IGA processes, facing integration hurdles, slow provisioning, and audit fatigue. As compliance demands grow, legacy tools fall short—driving urgent demand

    Read More
  • CyberArk Comply

    CyberArk Comply

    CyberArk Comply automates user access reviews with AI-driven profiles, reducing manual effort and review scope.

    Read More
  • CyberArk Provisioning

    CyberArk Provisioning

    CyberArk Provisioning uses AI-powered profiles to automate user access across the employee lifecycle. It streamlines onboarding, access changes, and revocations, reducing IT workload, improving securi

    Read More
  • CyberArk AI Profiles

    CyberArk AI Profiles

    CyberArk AI Profiles use machine learning to automate identity and access management, simplifying role and group creation, reducing manual efforts, and maintaining least-privilege access

    Read More
  • Mastering Access Reviews: An Auditor's Perspective48:49

    Mastering Access Reviews: An Auditor's Perspective

    Struggling with access reviews? Get expert tips on automation, catching hidden accounts, and staying audit-ready in this must-watch webinar.

    Watch Video
  • Why Legacy IGA Fails in the Modern Cloud Era

    Why Legacy IGA Fails in the Modern Cloud Era

    Legacy IGA slowing you down? Discover how modern IGA brings agility, automation, and compliance to today’s fast-paced, cloud-first environments.

    Read More
  • Common Pitfalls of User Access Reviews

    Common Pitfalls of User Access Reviews

    User access reviews often miss key details and become error-prone. This guide shares tips to improve reviews and avoid common mistakes without overloading teams.

    Read More
  • Best Practices for Executing an Effective and Efficient UAR

    Best Practices for Executing an Effective and Efficient UAR

    Access reviews are essential—but they don’t have to drain your team’s time. This guide explores proven strategies from IT teams who’ve used automation to streamline user access reviews

    Read More
  • The future of identity governance: fast, secure, and scalable

    The future of identity governance: fast, secure, and scalable

    If the mere mention of identity governance and administration (IGA) stresses you out, you’re in good company. Managing digital identities and access privileges is a significant challenge that only...

    Read Blog
  • The 2025 State of IGA Survey is Available Now

    The 2025 State of IGA Survey is Available Now

    This blog was originally published by Zilla Security, now a CyberArk Company and may reference legacy product names that are now part of the CyberArk IGA portfolio. Here at Zilla Security, we’re...

    Read Blog
  • Strategies for Managing Non-Human Identities

    Strategies for Managing Non-Human Identities

    This blog was originally published by Zilla Security, now a CyberArk Company and may reference legacy product names that are now part of the CyberArk IGA portfolio. Since the emergence of Identity...

    Read Blog
  • The Power of AI-Driven Pre-Approvals

    The Power of AI-Driven Pre-Approvals

    This blog was originally published by Zilla Security, now a CyberArk Company and may reference legacy product names that are now part of the CyberArk IGA portfolio. One of the big challenges that...

    Read Blog
  • loading
    Loading More...