All Research
Executive View
IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, the tool reduces manual intervention and improves accuracy of user entitlements. The latest release adds cloud access management capability allowing entitlements in DevOps environments to be monitored and managed.

1 Introduction

Identity data continues to increase in importance as organizations seek to bolster their corporate cybersecurity. Not only is access to identity information important, currency of data is important too. Directory updates in a nightly basis are no longer satisfactory, connectors that maintain data in real time are now expected. Increasingly a simple interface to enterprise applications is not enough, the ‘identity fabric’ within an organization must support authorization servers, network analyzers, AI bots and, in some cases, IoT platforms.

As the IT environment becomes more complex, so does the identity management task. Supporting hybrid environments, in which cloud-based resources require access to identity data, is more difficult than on-premise resources because of the higher risk profile of data external to the corporate network. Regulation adds another layer of complexity with many jurisdictions placing sovereignty restrictions on where identity data can be stored.

An identity fabric must accommodate all requirements and adhere to the contemporary technology architecture adopted by an organization. It is no longer acceptable for the IAM infrastructure to populate an on-premise enterprise directory and expect relying applications to use it. Contemporary technology includes IDaaS, support for hybrid cloud environments, APIs with RESTful interfaces, support for DevOps environments, support for IoT platforms etc. This means core IAM facilities must be extended so that the identity fabric provides real-time identity data to all enterprise resources that require it.

Core IAM facilities include identity provisioning and governance tools that are expected in any identity management environment. This includes on-boarding of staff, whether employees or contractors, setting of entitlements, typically via an approval process, de-provisioning of users when they leave the organization and a governance process to allow entitlements to be validated and audited. The umbrella term for this functionality is identity and governance administration (IGA).

The other functionality expected of IAM solutions is the access control that it enables. This too is evolving rapidly. While in the past access control logic within an application initiated an LDAP query to an identity data store, contemporary requirements include SAML support for cloud-based applications, SCIM interfaces to support external authorization servers, HTTP support for token-based authentication servers and credential storage to support MFA requirements.

But contemporary identity fabrics must go further; increasingly identity analytics must be provided. To the degree possible, automation should be used to reduce the level of manual intervention typically needed in provisioning user accounts and in recertifying entitlements. Modern IAM environments should include an analytics facility that will monitor the entitlements of users to ensure that they are correct, any exceptions to the expected role assignments should be flagged for review. No longer will certification campaigns absorb much of a manager’s time, the IAM environment will automate the core attestation tasks.

SailPoint has been a major purveyor of IGA functionality for many years. The Company was an early proponent of business-focused identity governance by providing greater visibility and transparency to identity management within an enterprise. They are now extending the functionality provided by IdentityIQ to encompass the consistency and repeatability required by the modern enterprise which relies on their identity fabric to support the organization’s business operations. They have leveraged the AI technology of Orkus and the cross-environment monitoring capability of OverWatchID, companies acquired in 2019, to provide a sophisticated IAM solution for the modern enterprise.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Register
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use