{"id":5845,"date":"2020-09-15T10:06:53","date_gmt":"2020-09-15T08:06:53","guid":{"rendered":"https:\/\/www.axitea.com\/servizi\/identity-access-governance\/"},"modified":"2025-02-11T14:52:42","modified_gmt":"2025-02-11T13:52:42","slug":"identity-access-governance","status":"publish","type":"servizi","link":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/","title":{"rendered":"Identity Access Governance"},"content":{"rendered":"\n<h4>\n\t\tCyber Security\n\t<\/h4>\n<h1>\n\t\tIdentity Access Governance\n\t<\/h1>\n\t<p>Designing, managing and monitoring access to corporate information assets<\/p>\n\t\t\n\t\t\t<p>The data maintained in the information systems are part of the company&#8217;s information assets, and, as such, it should be protected and managed appropriately.To do this, we need to establish rules that guarantee the management of access privileges to such data and the assignment of such privileges to the users, in order to protect the security of the data itself as much as possible, respecting the principles dictated by all the regulations in force regarding Privacy and data protection.A fundamental component of these rules is the organizational processes for managing logical access to applications and corporate work tools.<\/p>\t\t\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png\" alt=\"Ico-pos-Monitoraggio reti informatiche\" \/>\n\t\t\n\t\t\t\t\t<p>74% of employees admit to having taken risky actions, such as reusing or sharing a password, clicking on links from unknown senders, or handing over their credentials to an untrustworthy source (Source: State of The Phish 2024)<\/p>\n<h2>\n\t\tHow Axitea can help you\n\t<\/h2>\n\t<p>Axitea&#8217;s Security Governance services are able to intercept every customer need, with regard to:<\/p>\n\t\t<p>Security Accountability<\/p>\n\t\t\t\t\t<p>A certificate that attests to the company&#8217;s compliance with legal provisions, to prove that it handles sensitive information and personal data in a secure manner.<\/p>\t\t\t\t\n\t\t<p>Risk Reduction<\/p>\n\t\t\t\t\t<p>Reduction of cyber threat related risks, and consequent reduction of any incident-related managing costs.<\/p>\t\t\t\t\n\t\t<p>Integrated risk analysis<\/p>\n\t\t\t\t\t<p>Axitea&#8217;s risk analysis methodology involves an integrated assessment of different assets: people, processes, procedures and technologies. Each one of these assets is treated in a specific way, by applying the most appropriate analysis to the context.<\/p>\t\t\t\t\n\t\t<p>Constant risk monitoring<\/p>\n\t\t\t\t\t<p>Continuous measurement of corporate security performance through sustainable KPIs tailored to the customer&#8217;s specifics.<\/p>\t\t\t\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tWould you like to know more about Identity Access Governance?\n\t<\/h2>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContact us\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\"><\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class='_form_19'><\/div><script type='text\/javascript' src='https:\/\/axitea.activehosted.com\/f\/embed.php?static=0&id=19&69E302F97270C&nostyles=1&preview=0'><\/script>\t\t\t\t\t\n<h2>\n\t\tMain features\n\t<\/h2>\n\t\t<p>Assessment<\/p>\n\t\t\t\t\t<p>Aimed at verifying the GRC (Governance, Risk &amp; Compliance), by identifying procedural, organizational and security gaps in websites.<\/p>\t\t\t\t\n\t\t<p>Vulnerability assessment<\/p>\n\t\t\t\t\t<p>Aimed at verifying perimeter vulnerabilities that allow unauthorized (internal\/external) access and Data Leakage activities of company compliance and business sensitive information.<\/p>\t\t\t\t\n\t\t<p>Threat Intelligence<\/p>\n\t\t\t\t\t<p>Aimed at verifying possible exfiltrations that already occurred and identifiable through scanning in OSINT environment, in the Deep\/Dark Web.<\/p>\t\t\t\t\n<h2>\n\t\tOther Cyber Security Solutions\n\t<\/h2>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5747\" content=\"Data Center Security &#038; Protection\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2025-01-22\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/data-center-protection\/' title='Data Center Security &#038; Protection'>Data Center Security &#038; Protection<\/a><\/h3>\n        \t<p>Monitoring and protection of single applications and processes within a corporate network, through non-IP-based segmentation.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/data-center-protection\/' title='Data Center Security &#038; Protection'>Data Center Security &#038; Protection<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5716\" content=\"Cyber Security Exposure\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/security-exposure\/' title='Cyber Security Exposure'>Cyber Security Exposure<\/a><\/h3>\n        \t<p>Collection and analysis of information in order to characterize possible cyber threats from a technical, resource, motivation&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/security-exposure\/' title='Cyber Security Exposure'>Cyber Security Exposure<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5708\" content=\"Vulnerability Analysis and Penetration Test\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a><\/h3>\n        \t<p>Test for measuring the level of protection of the IT network and digital infrastructure, in order to&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tFind out what we have done for our customers.\n\t<\/h2>\n\t\t\t<a href=\"https:\/\/www.axitea.com\/en\/case-studies\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\tALL CASE STUDIES\n\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/8853\" content=\"IT asset protection for the insulating glass leader, ISO CLIMA\" \/><meta itemprop=\"datePublished\" content=\"2022-04-12\" \/><meta itemprop=\"dateModified\" content=\"2024-03-15\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/gianfranco-ciuffreda\/\" \/><meta itemprop=\"name\" content=\"gianfranco.ciuffreda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/it-asset-protection-for-the-insulating-glass-leader-iso-clima\/' title='IT asset protection for the insulating glass leader, ISO CLIMA'><img width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA.jpeg\" alt=\"iso clima sede\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-1536x1025.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \tManufacturing\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/it-asset-protection-for-the-insulating-glass-leader-iso-clima\/' title='IT asset protection for the insulating glass leader, ISO CLIMA'>IT asset protection for the insulating glass leader, ISO CLIMA<\/a><\/h5>\n        \tCyber Security\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/6822\" content=\"Cold chain and security for the BOMI Group\" \/><meta itemprop=\"datePublished\" content=\"2021-03-29\" \/><meta itemprop=\"dateModified\" content=\"2021-12-29\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/' title='Cold chain and security for the BOMI Group'><img width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-1536x1025.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \tTransport\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/' title='Cold chain and security for the BOMI Group'>Cold chain and security for the BOMI Group<\/a><\/h5>\n        \tVehicle Security\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/6924\" content=\"Advanced security of natural gas storage for Ital Gas Storage\" \/><meta itemprop=\"datePublished\" content=\"2021-01-14\" \/><meta itemprop=\"dateModified\" content=\"2021-12-29\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/' title='Advanced security of natural gas storage for Ital Gas Storage'><img width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-1536x1025.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \tOther Markets\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/' title='Advanced security of natural gas storage for Ital Gas Storage'>Advanced security of natural gas storage for Ital Gas Storage<\/a><\/h5>\n        \tPhysical Security\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/6874\" content=\"Ensuring store security in VF Italy Retail multibrand stores\" \/><meta itemprop=\"datePublished\" content=\"2021-01-07\" \/><meta itemprop=\"dateModified\" content=\"2021-12-29\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/' title='Ensuring store security in VF Italy Retail multibrand stores'><img width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-1536x1025.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \tRetail &amp; Large-scale retail channels\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/' title='Ensuring store security in VF Italy Retail multibrand stores'>Ensuring store security in VF Italy Retail multibrand stores<\/a><\/h5>\n        \tPhysical Security\n\t\t<!-- .pp-content-posts -->\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\n\t<p>Would you like to know more on what Axitea can do for you?<\/p>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContact Us\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\"><\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<!--[activecampaign form=19]-->\n<iframe loading=\"lazy\" src=\"https:\/\/go.axitea.com\/l\/1015162\/2023-09-01\/3c4nx\" width=\"100%\" height=\"100%\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\"><\/iframe>\n\n","protected":false},"excerpt":{"rendered":"<p>Consulting services for the design, management and monitoring of access to corporate information assets.<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"categoria_servizio":[87,95],"mercati-relativi":[],"tag_servizi":[],"servizi_folder":[],"class_list":["post-5845","servizi","type-servizi","status-publish","format-standard","hentry","categoria_servizio-cyber-security","categoria_servizio-cyber-security-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity Access Governance | Axitea<\/title>\n<meta name=\"description\" content=\"The Identity Access Governance service enables the design, management, and monitoring of access to a company&#039;s information assets. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Access Governance | Axitea\" \/>\n<meta property=\"og:description\" content=\"The Identity Access Governance service enables the design, management, and monitoring of access to a company&#039;s information assets. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T13:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/\",\"name\":\"Identity Access Governance | Axitea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\",\"datePublished\":\"2020-09-15T08:06:53+00:00\",\"dateModified\":\"2025-02-11T13:52:42+00:00\",\"description\":\"The Identity Access Governance service enables the design, management, and monitoring of access to a company's information assets. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/identity-access-governance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/soluzioni\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity Access Governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity Access Governance | Axitea","description":"The Identity Access Governance service enables the design, management, and monitoring of access to a company's information assets. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/","og_locale":"en_US","og_type":"article","og_title":"Identity Access Governance | Axitea","og_description":"The Identity Access Governance service enables the design, management, and monitoring of access to a company's information assets. Learn more.","og_url":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/","og_site_name":"AXITEA","article_modified_time":"2025-02-11T13:52:42+00:00","og_image":[{"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/","url":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/","name":"Identity Access Governance | Axitea","isPartOf":{"@id":"https:\/\/www.axitea.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","datePublished":"2020-09-15T08:06:53+00:00","dateModified":"2025-02-11T13:52:42+00:00","description":"The Identity Access Governance service enables the design, management, and monitoring of access to a company's information assets. Learn more.","breadcrumb":{"@id":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/en\/cyber-security\/identity-access-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/www.axitea.com\/en\/soluzioni\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"Identity Access Governance"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/en\/#website","url":"https:\/\/www.axitea.com\/en\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/en\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/servizi\/5845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/servizi"}],"about":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/types\/servizi"}],"author":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/users\/3"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/media?parent=5845"}],"wp:term":[{"taxonomy":"categoria_servizio","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/categoria_servizio?post=5845"},{"taxonomy":"mercati-relativi","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/mercati-relativi?post=5845"},{"taxonomy":"tag_servizi","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/tag_servizi?post=5845"},{"taxonomy":"servizi_folder","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/servizi_folder?post=5845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}