All Research
Executive View
It’s time to consider a different way to manage and use identity information. We tend to deploy identity management suites and change our processes to suit. But this can constrain us and restrict our agility in deploying identity management services. Tremolo Security breaks the mold and asks us to focus on the task to be performed, and then to deploy an optimal solution.

1 Introduction

It's fair to say that the identity and access management (IAM) market is mature. Most large organizations now have an IAM environment that manages on boarding and off boarding of staff, provides an authentication facility to control access to protected resources, and supports a level of governance over the use and management of identity data.

But with the increasing complexity of IT environments and the burgeoning adoption of APIs, standard IAM suite solutions have sometimes been found wanting. What was once a simple “is the requesting user in the appropriate AD group?” is now “is the user a staff member, is he an approved developer, has he passed the Python proficiency test and is 2 FA required?”

The maturing market is also widening, IAM is increasingly recognized as being essential to cyber-security and organizational efficiency. Companies are increasingly wanting to exploit the benefits that a properly deployed IAM environment can afford. They want the efficiency of an approval workflow engine that provides benefits in better security and lower costs, they want the access control of an authorization service based on real-time identity attributes and context variables, and they want the governance that can be achieved via a proficient identity management solution.

What they don’t want is a rigid product offering that either provides much more functionality than they really need, or a solution that doesn’t fit their current operation and requires them to change to their business processes. And they don’t want an IAM solution that’s too expensive.

The key requirement these days is agility. Customers might have a need for a basic identity manager solution to on board staff but without the need for an approval workflow initially. They need to be able to add this on in the future. For authentication their initial requirement might be for coarse-grained access control but with a future aspiration for role based, or even attribute based access control. Governance may not be specified as an initial requirement but support for a reporting and audit function is highly desirable.

Tremolo Security have an ideal product offering for this diverse and changing marketplace. It has the ability to satisfy a single and complex requirement, or to provide all the major functionality of a complete IAM solution.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use