Edina Szemán

Why Role Mining Fails in Most IAM Projects & What Needs to Change

Role mining has long been positioned as a cornerstone of Identity and Access Management (IAM). In theory, it enables organizations to define who should have access to what based on job function, responsibility and business context.  In practice, however, many organizations struggle to make role mining deliver real value.  The Core Problem: IAM Was Not Built for Role Discovery  […]

Why Role Mining Fails in Most IAM Projects & What Needs to Change Read More »

Access Role Mining in IAM: The Foundation of Effective RBAC and Identity Governance

Modern Identity and Access Management (IAM) programs often fail for one simple reason: poorly designed roles.  Organizations invest in Identity Governance and Administration (IGA), implement approval workflows, run User Access Reviews, and enforce Segregation of Duties (SoD) policies, yet access risk continues to grow.  The root cause is frequently overlooked: lack of structured, data-driven Access Role Mining. 

Access Role Mining in IAM: The Foundation of Effective RBAC and Identity Governance Read More »

XS Matrix Security Solutions Secures Strategic Investment to Accelerate Global Expansion

XS Matrix Security Solutions, the company behind the TheFence™ platform, has secured a strategic investment from Széchenyi Funds to support its next phase of growth. Founded in 2016, the company has steadily built a next-generation, AI–driven Identity Governance and Administration (IGA) platform designed to help organizations of all sizes. It streamlines identity lifecycle management, accelerates onboarding,

XS Matrix Security Solutions Secures Strategic Investment to Accelerate Global Expansion Read More »

XS Matrix Global Co. (TheFence) Successfully Achieves SOC 2® Type 2 Compliance

We are thrilled to announce that XS Matrix Global Co., the manufacturer of TheFence, has successfully achieved SOC 2® Type 2 compliance, marking a significant milestone in our ongoing commitment to data security, trust and regulatory compliance.  Over the past few year, TheFence has evolved into a modular IGA platform designed to support organizations of all sizes. It

XS Matrix Global Co. (TheFence) Successfully Achieves SOC 2® Type 2 Compliance Read More »

How AI Improves Identity Governance: From Access Reviews to Risk-Based Decisions

AI in IGA: Practical Capabilities, Real Limitations, and What Enterprises Need to Know   AI (Artificial Intelligence) is reshaping how organizations approach Identity Governance and Administration (IGA). Traditionally, IGA relied on manual workflows, static role models, entitlement reviews and periodic access certifications. Today, AI introduces dynamic insights, predictive recommendations, and risk-based automation. Vendors emphasize “self-driving IGA,” promising optimized approval cycles and near-instant anomaly detection.

How AI Improves Identity Governance: From Access Reviews to Risk-Based Decisions Read More »

The Human Side of Identity and Access Management

HR and IT in Sync: The Human Side of Identity and Access Management (IAM) and Cybersecurity

In today’s digital workplace, one of the biggest cybersecurity risks doesn’t come from hackers — it comes from within the organization.  Poorly managed user access, excessive permissions or forgotten accounts can quickly lead to compliance violations or even data breaches.  That’s why Identity and Access Management (IAM) is no longer just an IT concern —

HR and IT in Sync: The Human Side of Identity and Access Management (IAM) and Cybersecurity Read More »

TheFence Partners with Romsym Data to Expand into the Romanian Market

XS Matrix Security Solutions (XSM), the manufacturer of THEFENCE™, the AI-powered Access Platform, has entered into a strategic partnership with Romsym Data, Romania’s leading IT security software distributor. This collaboration marks TheFence’s official entry into the Romanian market, bringing next-generation identity governance and administration (IGA) capabilities to organizations across the country.  With more than 30

TheFence Partners with Romsym Data to Expand into the Romanian Market Read More »

Implementing the Principle of Least Privilege: Challenges, Pitfalls and Practical Solutions

If there’s one golden rule in cybersecurity that never goes out of style, it’s the principle of least privilege (PoLP). At its simplest, PoLP means giving every user, system, or application only the access they need — and nothing more.  Sounds easy, right? In reality, organizations of all sizes struggle to put this into practice.

Implementing the Principle of Least Privilege: Challenges, Pitfalls and Practical Solutions Read More »

Identity Governance and Administration (IGA): Why It Has Become a Top Enterprise Security Priority

Understanding IGA and Its Strategic Role  Identity Governance and Administration (IGA) encompasses the frameworks, technologies and policies that ensure the right individuals — whether human or machine identities — receive, maintain and retire the right access to the right resources at the right time, in accordance with business rules and regulatory requirements.  Far beyond being

Identity Governance and Administration (IGA): Why It Has Become a Top Enterprise Security Priority Read More »

Navigating the Future of Identity: Key Questions Around IGA in Modern Cybersecurity

With the rise of hybrid infrastructures and identity sprawl, IGA acts as a critical enforcement point to control who has access to what – and why – across the enterprise.  As organizations embrace hybrid infrastructure, decentralized workforces, and evolving regulatory mandates, IGA provides the structure to manage identity at scale with consistency and confidence.  This

Navigating the Future of Identity: Key Questions Around IGA in Modern Cybersecurity Read More »

Scroll to Top