To receive an excerpt of this report, please fill out the following:

Fields marked with an * are required

 

 

 

 

 

IGA Has Failed—What is the Best Path Forward?

 

Authors

Kevin Kampman – Principal Consulting Analyst

 

Abstract

We start with the premise that Identity Governance and Administration (IGA), touted as the way to answer  “Who Has Access to What?” has largely failed to achieve the results most enterprises expected over the past 25 years. IGA was initially introduced to improve the provisioning process, but it has evolved over the years to include entitlement discovery, decision-making processes, access request/review workflows and certification, along with risk scoring, identity lifecycle/role management and access compliance reporting. IGA operates at the intersection of business process management and access automation.

To be fair, the expectations of IGA have been really high and the blending of complex technology across heterogeneous environments coupled with direct business impact is really difficult to manage…and it won’t get easier as cyberattacks become more and more sophisticated.

While IGA has not met expectations, we’ll describe some of the key challenges, but more importantly, a path forward for vendors and enterprises to achieve successful IGA programs.

We can help

If you want to find out more detail, we're happy to help. Just give us your business email so that we can start a conversation.

Thanks, we'll be in touch!

Stay in the know!

Keep informed of new speakers, topics, and activities as they are added. By registering now you are not making a firm commitment to attend.

Congrats! We'll be sending you updates on the progress of the conference.