For the best web experience, please use IE11+, Chrome, Firefox, or Safari

State of IGA Infographic

We commissioned Dimensional Research to do a security-focused global survey to capture hard data on experiences and approaches to Identity Governance and Administration (IGA). Data was collected from more than 1,000 IT professionals with security responsibilities. Here’s what we learned about the systems-maturity level and preparedness. 

In general, most organizations rely on manual processes to execute all or part of their identity management tasks. A few organization are fully integrated and leverage automated workflows to provision and deprovision user access to resources. And fewer still have true governance with access certification (and attestation), access request capabilities and automated approval processes, which makes it more work to stay compliant and maintain optimal efficiency. 

We’ve highlighted key points in the survey to provide an overview of the state of IGA around the globe.

View Infographic

You may also be interested in.

White Paper

KuppingerCole Executive View on Identity Manager

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consis...
White Paper

How to manage SAP-User Accounts and Access Rights with Identity Manager

Identity Manager helps you set up and manage SAP user accounts, groups, roles, profile assignments and transactions. Get our wh...
On Demand Webcast

Free on-demand webinar: Understanding SCIM for Identity Provisioning between Clouds and… Everyth...

Everything you access on the web, on-prem or in the cloud requires a user account and, as you know, it can be a nightmare to ma...
Technical Brief

One Identity Manager - Scalability and Performance

This paper will describe the scalability options of One Identity Manager to manage your existing small to large employee IT inf...
Online Event

Best Practices for migration from SAP IDM to One Identity Manager with FastLane

2026 is the last year to use SAP Identity Management (SAP IDM). So there is still time to find a solution that meets your uniqu...
On Demand Webcast

Strengthening your identity security posture: How One Identity Manager's ITDR capabilities trans...

Stream this on-demand session to transform your identity program from reactive to proactive security.
White Paper

Tackling NHI Threats

Machines, bots, scripts, services and AI agents – known as non-human identities (NHIs) – are now outnumbering humans 50 to 1 in...
White Paper

Leveraging the One Identity toolkit to extend governance across the IT estate

Identity security experts know that not all applications and systems are created equal—and they do not all require the same deg...