The landscape of Identity and Access Management (IAM) is changing. While large-scale IAM Systems are traditionally operated within the enterprise, many strategic changes can be seen in almost any organization such as:
- The advent of mobile and remote access to enterprise resources through a vast range of portable devices including mobile phones, tablets or notebook computers.
- Potentially large numbers of access policies and controls for external users (ranging from partners to customers and prospects) need to be incorporated into enterprise processes and infrastructure.
- New concepts for the collaboration of organizations, which can be summarized as what KuppingerCole refers to as the “new ABC ─ the Agile Business, connected”, need to be taken into consideration. This includes the relationship between the employee, contractors, and the business (B2E), the interaction between customers, and the business (B2C), and the relationship between businesses (B2B).
- Massive traction in Cloud adoption as an additional and increasingly important platform for delivering existing as well as new types of IT services (from Infrastructure as a Service to Software and Platforms as a Service). Infrastructure platforms like Microsoft Azure or Amazon Web services (AWS), services and infrastructures like SharePoint or Office 365, and full enterprise application platforms like Salesforce or SAP solutions in the cloud are important components of today’s enterprise IT service delivery strategies and need to be securely and adequately maintained with identity administration and governance.
Traditional, perimeter-based security is becoming less important. Previously adequate strategies for implementing tools and processes for achieving governance, as well as providing evidence for compliance, need to be adapted and extended to meet the new challenges outlined above.
Many organizations and many vendors have understood that with the changing landscape, as described above, the role of the identity and its associated access is getting increasingly relevant. The simplistic but true statement that “identity is the new perimeter” illustrates the importance of the role of adequate Identity Management, robust and efficient administrative processes and rock-solid governance across all enterprise resources.
Today, adequate product offerings require an intelligent approach towards integration with existing infrastructures, data sources, and processes. Customers, looking for solutions to the above-described areas, don’t look for another Identity and Access Management suite; instead, they look for new solutions and concepts tying together their existing on-premises infrastructure with external cloud service offerings. This, however, has to be achieved at an Internet scale, with the identity and its access to corporate and external resources being at the core of the architectural vision.
Founded in 2010, Saviynt is a privately held company headquartered in Los Angeles, CA with offices in the US, UK, and India. Saviynt provides Identity and Access Governance, and Cloud Security solutions in a single platform with add-on modules to secure on-prem and cloud-based applications, data, and infrastructure. The Saviynt Security Manager platform combines advanced analytics and intelligence with fine-grained, role, entitlement and privileged access management. Saviynt’s customers are worldwide including companies in the finance, banking, insurance, healthcare, and the oil & gas industries to name a few.