Advisory Note: Identity & Access Management/Governance Blueprint - 70839

Report Details

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access Management. Within this broad set of technologies, there is ongoing change and evolution. Access Governance and Identity Provisioning products are merged by some vendors, new Cloud IAM solutions integrate user management and access management.

The blueprint starts by defining the requirements process for the IAM/IAG environment, showing the important building blocks that need to be in place for identity and access control. This builds into a “Big Picture” overview, which is then broken down further to show interdependencies between the components of different technology areas. These can be used as reference patterns for architecture, project and programme management.

These reference patterns are based on controls which can be identified in the use cases listed after the big picture. These pick out a number of areas, giving not just examples of access and identity management, but of governance and risk management across the whole environment. From this perspective we are able to drill down, into the technical detail of the big picture and discuss some of the integration points for IAM/IAG which may be of practical use, and the pros and cons of doing so.

A short discussion of maturity levels shows what is common today in IAM/IAG today at level 3, as opposed to the ideal at maturity level 5. We expect to see a lot of connected enterprise/hybrid Cloud IAM as maturity level 3 in 2017, with today’s level 5 quickly becoming tomorrow’s expected level 3.

Finally, we wrap up with a few hints and pointers of how to succeed with the blueprint and implementing it in a real corporate environment.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jun 02, 2014

Advisory Note: Identity & Access Management/Governance Blueprint - 70839

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access…

€995.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

WALLIX Bastion

WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and privileged management for machines and applications. The product also provides detailed session recording,…

Whitepaper

Identity Governance Herausforderungen mit ForgeRock Autonomous Identity bewältigen

Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben sind komplex und schwerfällig. Bestehende IGA-Lösungen kommen dadurch an ihre Grenzen und werden als…

Whitepaper

Overcoming Identity Governance Challenges with ForgeRock Autonomous Identity

Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex and cumbersome. As a result, existing IGA solutions are faltering. Dynamic businesses require new approaches…

Leadership Compass

Privileged Access Management for DevOps

Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and…

Leadership Compass

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding the right path in the market.

Whitepaper

Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity

Privacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from users. Many Consumer Identity platforms have added in consent management features, and specialty Privacy and…

Whitepaper

Leveraging Your Organization's Expertise: Departmental IAM Services for the Business

To benefit from existing domain know-how within an organization, it is becoming increasingly important to involve different business stakeholders in administration, review, and maintenance processes. Dedicated, specialized and lean IAM services are a sustainable and efficient approach to…

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity provides the necessary migration framework to facilitate an IGA modernization transition.

Buyer's Compass

Buyer’s Compass: Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners and customers. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors,…

Executive View

IdentityIQ – SailPoint

IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, the tool reduces manual intervention and improves accuracy of user entitlements. The latest release adds cloud…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Informatica is Moving Data Management to the Cloud

Informatica is Moving Data Management to the Cloud
Martin Kuppinger

Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]

Latest Insights

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00