Clear Skye IGA 5.0 optimizes identity security and business processes on ServiceNow

Clear Skye launched Clear Skye IGA 5.0, the company’s most significant product release to date. An identity security and governance solution built natively on the ServiceNow Platform, 5.0 enables businesses to simplify workflows, increase productivity,… Continue reading Clear Skye IGA 5.0 optimizes identity security and business processes on ServiceNow

4 identity security trends to watch in 2023

While many of the tried and true best security hygiene practices remain, we’ll face new and complex business challenges related to how we work, the systems we use, threats and compliance issues we face. Although often overlooked, a strong identity gove… Continue reading 4 identity security trends to watch in 2023

Top tech for enterprise identity governance and security

Clear Skye and Gradient Flow announced the findings of their survey exploring the state of identity governance and security in the enterprise. The survey questioned 500+ respondents from a variety of industries, 62% of which hold job functions in infor… Continue reading Top tech for enterprise identity governance and security

Clear Skye partners with Templar Shield to improve security and user experience for enterprise organizations

Clear Skye announced that Templar Shield has joined the company’s Elevate Partner Program, designed to drive collaboration in the $13 billion and growing Identity Governance and Administration (IGA) market. Templar Shield, a premier cybersecurity, priv… Continue reading Clear Skye partners with Templar Shield to improve security and user experience for enterprise organizations

Clear Skye raises $14 million to close the gap between identity and business processes

Clear Skye announced that the company has completed a $14 million Series A funding round, bringing total funding for the company to nearly $20 million since its initial seed round in 2020. This latest investment was co-led by Storm Ventures and Toba Ca… Continue reading Clear Skye raises $14 million to close the gap between identity and business processes

Bridging the “front and back of the house”: A lesson in risk management

Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management practices. They often ignore one of the most important components of a solid risk… Continue reading Bridging the “front and back of the house”: A lesson in risk management

Four proactive steps to make identity governance a business priority

Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular component of security, but rather a capability that should be woven into the d… Continue reading Four proactive steps to make identity governance a business priority

Marry IGA with ITSM to avoid the pitfalls of Identity 2.0

Identity 2.0 vendors are about to face a reckoning. For too long, they’ve focused solely on compliance and missed the mark on the adaptability, automation and integration that modern enterprises require. They’ve also emphasized provisioning at a time w… Continue reading Marry IGA with ITSM to avoid the pitfalls of Identity 2.0

Achieving digital transformation by overcoming identity fatigue

Conversations about digital transformation (DX) are so frequent and pervasive that we tend to lose track of how incomplete they can be. You might think that DX only concerns the Internet of Things (IoT), big data, and application programming interfaces… Continue reading Achieving digital transformation by overcoming identity fatigue

How to avoid the most common mistakes of an identity governance program

It’s a story I have seen play out many times over two decades in the Identity and Access Management (IAM) field: An organization determines that it needs a more robust Identity Governance and Administration (IGA) program, they kick off a project to rea… Continue reading How to avoid the most common mistakes of an identity governance program