Advisory Note: Identity & Access Management/Governance Blueprint - 70839

Report Details

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access Management. Within this broad set of technologies, there is ongoing change and evolution. Access Governance and Identity Provisioning products are merged by some vendors, new Cloud IAM solutions integrate user management and access management.

The blueprint starts by defining the requirements process for the IAM/IAG environment, showing the important building blocks that need to be in place for identity and access control. This builds into a “Big Picture” overview, which is then broken down further to show interdependencies between the components of different technology areas. These can be used as reference patterns for architecture, project and programme management.

These reference patterns are based on controls which can be identified in the use cases listed after the big picture. These pick out a number of areas, giving not just examples of access and identity management, but of governance and risk management across the whole environment. From this perspective we are able to drill down, into the technical detail of the big picture and discuss some of the integration points for IAM/IAG which may be of practical use, and the pros and cons of doing so.

A short discussion of maturity levels shows what is common today in IAM/IAG today at level 3, as opposed to the ideal at maturity level 5. We expect to see a lot of connected enterprise/hybrid Cloud IAM as maturity level 3 in 2017, with today’s level 5 quickly becoming tomorrow’s expected level 3.

Finally, we wrap up with a few hints and pointers of how to succeed with the blueprint and implementing it in a real corporate environment.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jun 02, 2014

Advisory Note: Identity & Access Management/Governance Blueprint - 70839

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access…

€995.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Executive View

Executive View: OpenIAM Identity and Access Management - 70337

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SSO, Cloud SSO, and Identity Federation. The product is based on a modern, well-thought-out software architecture…

Advisory Note

Advisory Note: KRIs and KPI for Access Governance - 72559

This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then…

Executive View

Executive View: Omada Identity Suite - 70301

Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other features, strong automation of entitlement management and insight into access risks, altogether with a high…

Executive View

Executive View: Beta Systems Garancy IAM Suite - 71530

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong feature set with some outstanding capabilities such as the depth of application-specific connectors and role…

Executive View

Executive View: TITUS Classification for Mobile - 71320

TITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document storage on these devices. It integrates with a variety of other tools and services and is easy to use.

Executive View

Executive View: IBM Security Identity Governance and Intelligence - 71113

A business-driven approach to Access Governance and Intelligence, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Providing connectivity to target systems based on direct connectors and via IBM Security…

Executive View

Executive View: One Identity SafeGuard 2.0 - 71251

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities,…

Executive View

Executive View: SailPoint SecurityIQ - 70849

SailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governance capabilities. Amongst the outstanding features are the real-time and behavioral analytics features and the…

Executive View

Executive View: Thycotic Secret Server - 71060

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach…

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003

À l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

For Oracle, the Future Is Autonomous

Recently, I have attended the Oracle OpenWorld in San Francisco. For five days, the company has spared no expenses to inform, educate and (last but not least) entertain its customers and partners as well as developers, journalists, industry analysts and other visitors – in total, a crowd of [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25 th , 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00