Identity Governance and Administration (IGA) is how an organization answers the question "who has access to what, why, and is that still appropriate?". It owns the lifecycle of access — provisioning when people join or change roles, de-provisioning when they leave, periodic certifications when nothing changes, and the audit evidence that proves the controls are working.
The legacy IGA market (SailPoint, Saviynt, Oracle, IBM Security Verify) is being challenged by lighter cloud-native entrants (ConductorOne, Aquera, Lumos, Veza) that bet on faster connectors and modern UX over deep workflow customization. The right choice depends on the depth of compliance regime — SOX, NIST 800-53, ISO 27001, OSFI E-21 — and whether your environment is ERP-heavy (legacy wins) or SaaS-heavy (cloud-native wins).
This page tracks our reporting on IGA tooling, certification campaigns gone right and wrong, joiner/mover/leaver automation, role mining, and audit findings from real environments.