{"version":"1.0","provider_name":"Pulse","provider_url":"https:\/\/pulsebyscanda.com\/en\/","author_name":"Alejandra Vital","author_url":"https:\/\/pulsebyscanda.com\/en\/author\/admin-ejj412\/","title":"Identity Governance - Pulse","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zNwE6i4nby\"><a href=\"https:\/\/pulsebyscanda.com\/en\/identity-governance\/\">Identity Governance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/pulsebyscanda.com\/en\/identity-governance\/embed\/#?secret=zNwE6i4nby\" width=\"600\" height=\"338\" title=\"&#8220;Identity Governance&#8221; &#8212; Pulse\" data-secret=\"zNwE6i4nby\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/pulsebyscanda.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Identity Governance: Access Control, Compliance and Secure Privileges Efficiently manage identities, ensuring correct access and regulatory compliance TALK TO AN EXPERT Do you have traceability of all identities, privileges and critical access? With Identity Governance, automate the entire user lifecycle with IAM, manage privileges with PIM and strengthen security with MFA, RBAC and SSO. Comply [&hellip;]","thumbnail_url":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2025\/10\/Mesa-de-trabajo-1.png","thumbnail_width":800,"thumbnail_height":800}