Identity Governance Administration – Zero trust Risk based Governance.
Risk based Governance – Identity Governance & Administration
Third Party Access Governance – Risk from business relations
Data Access Governance – Protect sensitive or business critical files.
Cloud Privilege Access Management
Application Access Governance – Stop cross application access risks