Blog
Insights on identity security, access governance, and modern IGA.



Spotting the Unknown: How Grant Found Trigger Automation Strengthens Security
·Marcus Whitaker
Discover how C1’s grant found trigger automation helps security teams detect and remediate shadow access in real time. Stop unmanaged grants in AWS, GCP, GitHub, and more with automated workflows that notify, review, or revoke to enforce least privilege and close access blind spots.


How Treasure Data Transformed User Access Reviews with C1
·Claire McKenna
Discover how Treasure Data transformed its user access review program from manual spreadsheets to intelligent, continuous reviews with C1—cutting 160+ hours annually, expanding scope, and achieving meaningful security outcomes beyond compliance.



