-
Manage identities in hybrid and multi-cloud environments
-
control privileged accounts,
-
Analyze login patterns
-
based on risk factors or
-
Automate provisioning and other elements of the user lifecycle.
“Whether it’s advanced process analytics, integration with cloud service providers for improved workload management, or unifying the user experience with AI, organizations now have more functionality than ever before to build robust IAM initiatives,” said Naresh Persaud, Managing Director at Deloitte.
This development has led to many small ones Submarkets have formed – some of which contained independent products and some features that are part of a broader platform. Since the providers in this area are rapidly coming together, it can be expected that they will stimulate each other to a large extent and that comprehensive functionalities will emerge. In short: There are a variety of options that can lead to IAM analysis paralysis.
“Some vendors focus exclusively on Identity Governance and Administration (IGA), others on Privileged Access Management (PAM) – both of which are critical elements of an effective identity program. The authentication area is probably the one with the greatest product diversity, with many vendors in the industry offering solutions in the area Multi-factor authentication (MFA),” explains JR Cunningham, CSO at managed service provider Nuspire. “That’s why it’s essential for companies to define their current capabilities and requirements to ensure that the products they choose meet them.”