Next-Gen Identity Analytics and Access Governance Approach
- LANGUAGE: English DATE: Thursday, May 09, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity analytics and access governance for creation of Next-Gen IGA solutions. Machine Learning inspired IGA offers significant improvements to enhance identity analytics and access governance processes to enable IAM leaders support the business better by helping them make more informed decisions.
As Identity Governance and Administration (IGA) becomes a crucial part of every organization’s security portfolio, it is necessary to learn from past mistakes and build a business-centric IGA rather than technology-centric IGA to bridge the ever-increasing disconnect between business and IT security functions due to traditional IGA practices. IAM leaders must avoid shifting of IGA priorities from operational efficiency, better UX and risk management to just auditing and compliance. It is important that security leaders with a focus on IAM are able to demonstrate success early-on with initial IGA deployment phases to build necessary consensus among the business community and gather required support for on-going IGA activities. Identity Analytics and Access Governance have turned out to be effective instruments in helping IAM leaders achieve these objectives.
The paradigm shift to business-oriented IGA brings about several challenges, including:
- Being able to address the compliance needs such as periodic access certifications for access to data, resources, privileged operations, applications and other IT assets
- Building and automating access governance controls around new business initiatives
- Enforcing a user centric approach by educating and allowing better control of processes to stakeholders
- Being able to extend access governance and identity analytics to cloud-based systems (SaaS, IaaS etc.)
In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole Analysts AG, will discuss the challenges of conventional IGA and what is important for IAM leaders to know about IGA transformation. He will then provide inputs on how organizations need to align their processes to support the transition to Next-Gen IGA.
In the second part of the webinar, Sebastien Faivre, co-founder and CTO of the Brainwave company, will present Brainwave´s vision of the position of Identity Analytics and Governance compared to IAM presenting their approach to solve governance needs. To support his vision, he will illustrate this webinar with a short demonstration of the solution: Identity Analytics functions and Access Certification of 2000 entries within 3 minutes. He will demonstrate how it is possible to solve governance needs within 3 months with a dedicated IGA approach.
Brainwave is a French software vendor, specializing in identity and access governance. Founded in 2010 by a team of experts in IAM, Brainwave has developed Brainwave Identity GRC, an innovative business software solution.
It helps organizations to manage operational risks related to users and access rights and to build entitlements catalog, prepare account review, consolidate entitlements and streamline control plans.
Now with more than 65 customers, including BNP Paribas Cardif, Crédit Agricole, Scor, Transports Publics Genevois (Switzerland) or Cegeka (Belgium), Brainwave Identity GRC has gained a wider reputation throughout Europe and also has customers in North America (United-States and Canada).
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.