{"id":44133,"date":"2024-03-12T09:57:01","date_gmt":"2024-03-12T08:57:01","guid":{"rendered":"https:\/\/www.firstware.com\/?p=44133"},"modified":"2024-03-12T08:55:42","modified_gmt":"2024-03-12T07:55:42","slug":"what-is-it-governance","status":"publish","type":"post","link":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/","title":{"rendered":"What is IT governance?"},"content":{"rendered":"<p><span class=\"--l --r sentence_highlight\">IT governance is a strategic issue for all companies that use IT, w<\/span><span class=\"--l sentence_highlight\">hether it is in the cloud, in a hybrid environment or on prem in a data center.<\/span><\/p>\n<p><span class=\"--l --r sentence_highlight\">IT governance is used to define, manage, coordinate, control and monitor your company&#8217;s IT strategy and activities. <\/span><span class=\"--l sentence_highlight\">The aim is to ensure that your company works effectively and efficiently in the IT department, administration and within IT-using specialist departments in order to support business objectives using IT technology and minimize risks.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Index<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#IT-governance-vs-IT-compliance\" >IT governance vs. IT compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#IT-strategy\" >IT strategy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#The-procedure\" >The procedure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#Identity-governance-vs-IT-governance\" >Identity governance vs. IT governance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#About-FirstAttribute-AG\" >About FirstAttribute AG<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"IT-governance-vs-IT-compliance\"><\/span>IT governance vs. IT compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l --r sentence_highlight\">Many consulting firms offer you IT governance as a product. <\/span><span class=\"--l --r sentence_highlight\">This is never IT governance, but IT compliance. <\/span><span class=\"--l sentence_highlight\">This is a sub-area of governance and looks at IT compliance with legal and regulatory requirements.<\/span><\/p>\n<p><span class=\"--l --r sentence_highlight\">The development, implementation and monitoring of security measures and guidelines ensure that legal requirements are implemented. <\/span><span class=\"--l sentence_highlight\">However, IT compliance alone is not enough to bring you safely into the digital world, and looking at individual products is always problematic, as it does not ensure an overall view of IT and the interaction between applications.<\/span><\/p>\n<p><span class=\"--l --r sentence_highlight\">A look at the entire IT structure in order to record overarching IT compliance guidelines is an important aspect, as this is the only way to ensure that all data processing is GDPR-compliant and also complies with other rules. <\/span><span class=\"--l sentence_highlight\">There are a number of concepts that should be implemented.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-38440 size-full\" title=\"What is IT governance?\" src=\"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png\" alt=\"What is IT governance?\" width=\"4292\" height=\"1446\" \/><\/p>\n<p><span class=\"--l --r sentence_highlight\">The eleven focal points of IT governance. <\/span><span class=\"--l sentence_highlight\">Compliance is just a part of it.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"IT-strategy\"><\/span><span class=\"--l sentence_highlight\">IT strategy<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l --r sentence_highlight\">Your organization&#8217;s <strong>IT strategy<\/strong> determines what you focus on within information technology and data processing. <\/span><span class=\"--l sentence_highlight\">When defining the IT strategy, a number of complexities are considered in addition to IT compliance:<\/span><\/p>\n<ul>\n<li><span class=\"--l sentence_highlight\"><strong>IT portfolio management<\/strong> regulates which solutions you use and what you focus on<\/span>.<\/li>\n<\/ul>\n<ul>\n<li><span class=\"sentence_highlight\"><strong>The IT architecture and standardization<\/strong> describes which standards and concepts are used in your organization.<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span class=\"--l --r sentence_highlight\"><span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">IT<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">service<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">management <\/span><\/span><\/strong><span class=\"--l --r sentence_highlight\"><span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">determines <\/span><\/span><span class=\"--l --r sentence_highlight\"><span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">the<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">requirements<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">for<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">software<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">and<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">hardware<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">products<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">and<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">determines<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">which<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">SLAs<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">they<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">wish<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">to<\/span> <span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">use<\/span><span class=\"--l --r hover:bg-[#B4DAE8] hover:dark:bg-blue-next-600\">. <\/span><\/span><span class=\"--l --r sentence_highlight\">The entire budget is determined and regulated within IT investment and budgeting. <\/span><span class=\"--l --r sentence_highlight\">In IT risk management, you determine how you deal with risks and what measures you take against them<\/span>.<\/li>\n<\/ul>\n<ul>\n<li>With <strong>IT innovation<\/strong> <strong>and improvement<\/strong>, you describe your improvement programs and cycles.<\/li>\n<\/ul>\n<ul>\n<li><span class=\"--l --r sentence_highlight\"><strong>IT performance measurement<\/strong> defines key figures and regulates monitoring in order to be able to react quickly to changes and problems. <\/span><span class=\"--l --r sentence_highlight\">IT communication and transparency is the building block that regulates communication between IT and other departments and describes how IT wants to position itself within the company.<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"The-procedure\"><\/span><span class=\"--l sentence_highlight\">The procedure<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l --r sentence_highlight\">How should they proceed to implement successful\u00a0IT governance? <\/span><span class=\"--l sentence_highlight\">You need to be clear about your maturity level and existing IT landscape, and identify the points that are most important to ensure legal security and functionality.<\/span><\/p>\n<p><span class=\"--l --r sentence_highlight\">The maturity level analysis shows you, where you absolutely need to rework and where your next steps should go. <\/span><span class=\"--l --r sentence_highlight\">The overview of the IT landscape enables you to develop governance across all aspects of your IT infrastructure and software map.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Identity-governance-vs-IT-governance\"><\/span>Identity governance vs. IT governance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l --r sentence_highlight\">Identity governance is defined by centralized, rule-based control over the management of identities and access to them. <\/span><span class=\"--l --r sentence_highlight\">It not only promotes the security of information technology in companies, but also the adherence to compliance guidelines.<\/span><\/p>\n<p>FirstAttribute provides a range of software solutions designed to optimize the management of identities in both on-premises Active Directory environments and in the cloud.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/02\/IDM-Portal-Hybrid-IAM-Loesung-1.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" class=\"wp-image-38415 alignleft\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/02\/IDM-Portal-Hybrid-IAM-Loesung-1-300x250.png\" alt=\"\" width=\"199\" height=\"166\" \/><\/a><a title=\"https:\/\/firstware.com\/\" href=\"https:\/\/firstware.com\/en\/\" rel=\"noopener noreferrer nofollow\">FirstWare&#8217;s IDM portal<\/a> is an integrated solution for identity and access management (IAM) that enables the automated management of users and their authorizations, whether on-prem or in the cloud.<\/p>\n<p>This portal integrates all facets of identity and access management and enables centralized access to identity and directory services.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/03\/my-IAM-Logo-als-GIF-1-Effekt-Von-links-nach-recht-langsam.gif\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" class=\"wp-image-37369 alignright\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/03\/my-IAM-Logo-als-GIF-1-Effekt-Von-links-nach-recht-langsam-268x300.gif\" alt=\"\" width=\"65\" height=\"73\" \/><\/a>The <a title=\"https:\/\/my-iam.com\/de\/\" href=\"https:\/\/my-iam.com\/en\/\" rel=\"noopener noreferrer nofollow\">my-IAM Cloud Identity Management platform for digitalization<\/a> focuses on the integration and management of both internal and external identities in Microsoft Teams integrated apps, such as <a title=\"https:\/\/my-iam.com\/de\/peopleconnect\/\" href=\"https:\/\/my-iam.com\/en\/peopleconnect\/\" rel=\"noopener noreferrer nofollow\">my-IAM PeopleConnect<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"About-FirstAttribute-AG\"><\/span>About FirstAttribute AG<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>FirstAttribute AG is an independent German cloud service and software company with a focus on Identity &amp; Access Management (IAM) for AD and M365\/Entra ID.<\/p>\n<p>Find out everything you need to know about our software solutions and services\u00a0<a href=\"https:\/\/www.firstattribute.com\/en\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. Contact us if you want to update and accelerate your identity and authorization management and are looking for a customized IAM solution in a hybrid IT world.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/en\/company\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Contact us now<\/button><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT governance is a strategic issue for all companies that use IT, whether it is in the cloud, in a [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1836,9],"tags":[1961],"class_list":["post-44133","post","type-post","status-publish","format-standard","hentry","category-compliance-en","category-general","tag-it-governance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is IT governance? - FirstWare IDM-Portal<\/title>\n<meta name=\"description\" content=\"What is IT governance? | How to develop an IT strategy? | Procedure for a secure IT governance implementation |\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is IT governance? - FirstWare IDM-Portal\" \/>\n<meta property=\"og:description\" content=\"What is IT governance? | How to develop an IT strategy? | Procedure for a secure IT governance implementation |\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstWare IDM-Portal\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png\" \/>\n<meta name=\"author\" content=\"Elysabeth Yven\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elysabeth Yven\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/\"},\"author\":{\"name\":\"Elysabeth Yven\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/person\\\/1218d4546997de615b845bce65db7493\"},\"headline\":\"What is IT governance?\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-IT-Governance.png\",\"keywords\":[\"IT governance\"],\"articleSection\":[\"Compliance\",\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/\",\"name\":\"What is IT governance? - FirstWare IDM-Portal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-IT-Governance.png\",\"description\":\"What is IT governance? | How to develop an IT strategy? | Procedure for a secure IT governance implementation |\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-IT-Governance.png\",\"contentUrl\":\"https:\\\/\\\/firstware.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-IT-Governance.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/what-is-it-governance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is IT governance?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"name\":\"FirstWare IDM-Portal\",\"description\":\"Identity and Autorization Management in M365 and Active Directory\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#organization\",\"name\":\"FirstWare IDM-Portal\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"contentUrl\":\"https:\\\/\\\/www.firstware.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/IDM-Portal.ico\",\"width\":1,\"height\":1,\"caption\":\"FirstWare IDM-Portal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/#\\\/schema\\\/person\\\/1218d4546997de615b845bce65db7493\",\"name\":\"Elysabeth Yven\",\"url\":\"https:\\\/\\\/www.firstware.com\\\/en\\\/blog\\\/author\\\/elysabeth-yven\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is IT governance? - FirstWare IDM-Portal","description":"What is IT governance? | How to develop an IT strategy? | Procedure for a secure IT governance implementation |","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/","og_locale":"en_US","og_type":"article","og_title":"What is IT governance? - FirstWare IDM-Portal","og_description":"What is IT governance? | How to develop an IT strategy? | Procedure for a secure IT governance implementation |","og_url":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/","og_site_name":"FirstWare IDM-Portal","og_image":[{"url":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png","type":"","width":"","height":""}],"author":"Elysabeth Yven","twitter_misc":{"Written by":"Elysabeth Yven","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#article","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/"},"author":{"name":"Elysabeth Yven","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/person\/1218d4546997de615b845bce65db7493"},"headline":"What is IT governance?","mainEntityOfPage":{"@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"image":{"@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png","keywords":["IT governance"],"articleSection":["Compliance","General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/","url":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/","name":"What is IT governance? - FirstWare IDM-Portal","isPartOf":{"@id":"https:\/\/www.firstware.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png","description":"What is IT governance? | How to develop an IT strategy? | Procedure for a secure IT governance implementation |","breadcrumb":{"@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#primaryimage","url":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png","contentUrl":"https:\/\/firstware.com\/wp-content\/uploads\/2024\/03\/What-is-IT-Governance.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstware.com\/en\/blog\/what-is-it-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstware.com\/en\/"},{"@type":"ListItem","position":2,"name":"What is IT governance?"}]},{"@type":"WebSite","@id":"https:\/\/www.firstware.com\/en\/#website","url":"https:\/\/www.firstware.com\/en\/","name":"FirstWare IDM-Portal","description":"Identity and Autorization Management in M365 and Active Directory","publisher":{"@id":"https:\/\/www.firstware.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstware.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstware.com\/en\/#organization","name":"FirstWare IDM-Portal","url":"https:\/\/www.firstware.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","contentUrl":"https:\/\/www.firstware.com\/wp-content\/uploads\/2019\/06\/IDM-Portal.ico","width":1,"height":1,"caption":"FirstWare IDM-Portal"},"image":{"@id":"https:\/\/www.firstware.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.firstware.com\/en\/#\/schema\/person\/1218d4546997de615b845bce65db7493","name":"Elysabeth Yven","url":"https:\/\/www.firstware.com\/en\/blog\/author\/elysabeth-yven\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/posts\/44133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/comments?post=44133"}],"version-history":[{"count":0,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/posts\/44133\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/media?parent=44133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/categories?post=44133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstware.com\/en\/wp-json\/wp\/v2\/tags?post=44133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}