Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ
Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN
Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN
Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ
Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ
Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN
Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN
Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ California Consumer Privacy Act (CCPA) Cloud Governance Cloud Infrastructure Entitlement Management (CIEM) Continuous Compliance Converged Identity Platform (CIP) Cybersecurity Maturity Model Certification (CMMC) Data Access Governance (DAG) Deprovisioning DevOps DevSecOps Electronic Health Records (EHR) Federal Information Security Modernization Act (FISMA) General Data Protection Regulation (GDPR) Governance, Risk, & Compliance (GRC) Health Insurance Portability and Accountability Act (HIPAA) Identity Access Management (IAM) Identity as a Service (IDaaS) Identity Governance and Administration (IGA) Identity Management Infrastructure as a Service (IaaS) Internet of Things (IoT) | Saviynt Identity & Security Glossary Just-in-Time Access (JIT) Level of Assurance (LOA) Lift and Shift Machine Identity Machine Learning (ML) Multi-Factor Authentication (MFA) National Institute of Standards & Technology (NIST) Payment Card Industry Data Security Standard (PCI/DSS) Phishing Platform as a Service (PaaS) Privileged Access Management (PAM) Protected Health Information (PHI) Role-based Access Control (RBAC) Separation of Duties (SoD) Vendor Access Management (VAM) Zero Standing Privilege (ZSP) Zero Trust Network Access (ZTNA) Zero Trust Security Zero-Day Attack Access Control Application Access Governance (AAG) Attack Surface AuthN AuthZ
Converged Identity Platform (CIP)

Learn about Converged Identity Platforms (CIP), different types of Identity and Access Management (IAM) solutions, their benefits, and common FAQ.

Learn More
Cloud Infrastructure Entitlement Management (CIEM)

Learn about Cloud Infrastructure Entitlement Management (CIEM), the complications of managing entitlements in the cloud, and common FAQ.

Learn More
Zero Standing Privilege (ZSP)

Learn about Zero Standing Privileges (ZSP), the Zero Trust Security Model, Just-in-Time Access, the benefits of Zero Standing Privileges, and common FAQ.

Learn More
Vendor Access Management (VAM)

Learn about Vendor Access Management (VAM) solutions, risks of poor vendor access management, and get answers to common FAQs.

Learn More
Role-based Access Control (RBAC)

Learn about Role-based Access Control (RBAC) for identity management and how its implementation reduces access risks across the enterprise.

Learn More
Zero-Day Attack

Learn about Zero-Day Attacks, the exploits that lead to them, how they work, and how to reduce your risk of a security breach.

Learn More
Separation of Duties (SoD)

Learn about Separation of Duties (SoD), also known as Segregation of Duties, how to enforce SoD compliance, the risks of non-compliance, modern IGA solutions, and common FAQ.

Learn More
Cybersecurity Maturity Model Certification (CMMC)

Learn about Cybersecurity Maturity Model Certification (CMMC), its requirements, business impact, and common FAQ.

Learn More
Identity as a Service (IDaaS)

Learn about identity-as-a-service (IDaaS), the evolution of cloud-based IAM and IGA, how solutions have changed, and common FAQ.

Learn More
Data Access Governance (DAG)

Learn about data access governance (DAG), the business impact of data access governance, how Saviynt works with DAG, and common FAQ.

Learn More