How to set up your IAM organization
A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs and IAM Security Officers are struggling to promote and develop the maturity of skills in the silos of technical identity management services. Adapting the structure of IAM organizations so that they are based on a service capability model helps to address key challenges in managing a broad portfolio. In this Leadership Brief, the most important topics about a complete IAM organization and some of the pitfalls to avoid are discussed.
Not every Chief Information Security Officer (CISO) knows that IAM is possibly the most critical component in their portfolio. Delivering capabilities and services that protect the organization’s data, systems, and applications from unauthorized access is a complex area.
The complexity of permissions for devices and applications, combined with an endless stream of privacy and regulatory requirements, challenges the effectiveness of traditional IAM capability models. Organizations need to change their strategy and the way IAM provide solutions, to enhance productivity while addressing a constantly changing number of identity and access requirements.
Creating an IAM organization that can deliver new, innovative and applicable solutions is critical as organizations and technologies evolve. Equally important is the ability to deliver enterprise IAM services that meet the rapidly changing access and compliance requirements, while increasing productivity and reducing IT management costs.
Full article is available for registered users with free trial access or paid subscription.
Register and read on!
Sign up for the Professional or Specialist Subscription Packages to access the entire body of the KuppingerCole research library consisting of 700+ articles.