Deprovisioning

Deprovisioning What is Deprovisioning? Deprovisioning refers to the process of revoking access to resources and systems for a user who no longer needs them or is no longer authorized to use them. This is a critical aspect of computer security in the enterprise, as it helps to ensure that only authorized users have access to […]

Learn More
Enterprise Resource Planning (ERP)

Enterprise Resource Planning (ERP) What is Enterprise Resource Planning (ERP)? Enterprise resource planning (ERP) is a type of software that helps organizations manage and integrate various business processes and functions, such as finance, accounting, human resources, procurement, supply chain management, and project management. The goal of ERP is to enable organizations to use a single, […]

Learn More
FedRAMP

FedRAMP In today’s digital age, data security has become a paramount concern for all sectors of society. As governments shift towards digital platforms, the need to protect sensitive information and maintain reliable systems grows. The Federal Risk and Authorization Management Program (FedRAMP) defines and manages a core set of processes to ensure effective, repeatable cloud […]

Learn More
Identity and Access Management (IAM)

Learn about Identity and Access Management (IAM), how it’s used, and how it affects your business. Explore Identity and Access Management (IAM) solutions and FAQs.

Learn More
Identity, Credential, and Access Management (ICAM)

Explore the fundamentals of a modern ICAM framework, its practical application, and how government agencies and private sector organizations are are embracing its principles to reduce the risks of a cyber attack.

Learn More
Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) What is Infrastructure as a Service (IaaS)? Infrastructure-as-a-Service (IaaS) is a cloud computing model where virtual machines are created and used to manage cloud-based information technology and network infrastructure. Organizations can create virtual machines, choose physical host locations, and leverage APIs to manage and configure the cloud-based infrastructure. The National […]

Learn More
Internet of Things (IoT) | Saviynt Identity & Security Glossary

Learn about the Internet of Things (IoT), how it’s evolving, different types of machine identities and how to secure them, and common FAQ.

Learn More
Just-in-Time Access (JIT)

Learn about the Just-in-Time Access security model and provisioning access management systems, implementation, and business benefits.

Learn More
Machine Identity

What is a machine identity? How do organizations manage and secure machine identities? Learn about bots, APIs, and common FAQ.

Learn More
Phishing

Phishing What is Phishing? Phishing is a method of social engineering by which a hacker sends a fraudulent message designed to trick a person into revealing sensitive information such as credit card numbers, financial information, or otherwise exploitable personal identifying information (PII). Phishing may also be used to trick someone into installing malicious software on […]

Learn More