Vladislav (Vlad) Shapiro, Principal Consulting Analyst
Vlad Shapiro has more than 20 years of experience in Information Technology, Identity Governance and Administration, Identity and Access Management, Bioinformatics. Data Governance, and Data Analysis and Mining. His expertise ranges from mathematical modeling of identity management data, analysis of current Identity and Access Management practices to mastery of IGA program, including maturity evaluation and client advisory services.
Vlad has held senior advisory positions in Identity Governance, most recently with Identity and Access Management consulting firms, AurionPro and Immersion Technology Services. Previously, he was a Business Development Manager, IGA with Dell/Quest/Voelcker Informatics, where he integrated Voelcker technology into the Quest portfolio. Mr. Shapiro was responsible for training and tutoring the business development, pre-sales, sales and marketing organizations in the sales techniques for the Voelcker portfolio. He also collaborated on the future strategy of Quest in Identity, Governance and Administration field.
Vlad is the author of the Costidity concept, a way of measuring the human factor in IT Security and IGA. He published the “Costidity: The Cost of Human Factor” in 2016.
At TechVision Research, Vlad is focusing on the following areas:
- Identity Governance and Administration
- Identity and Access Management
- Modern trends in IAM/IGA: blockchain, user behavior analysis and people-centric security
- Data analysis and modeling related to IAM/IGA
- Artificial intelligence and machine learning in identity governance
- Identity Governance and Administration (IGA)
- Identity and Access Management (IAM)
- Big Data analysis
- Artificial intelligence and Machine Learning
Recently Published Research
Identity Governance Administration: journey to people-centric, business-oriented future of access control
Identity-related business (IDM, AM, IAG) has developed rapidly in the last 15-20 years, and today is one of the hottest and most demanded topics in current information systems management. In a nutshell, the issue is people have many access profiles across one or more enterprises, and there is no central authority empowered to make decisions about granting and controlling access and entitlements to enterprise resources, such as applications, physical devices, and logical systems.
Today control belongs to resource/application administrators, not to business leaders and policy makers of the company, which creates conflict, misunderstanding and ultimately security issues. Since administrators do not have enough information about required policies and business leaders do not have the adequate tools to implement them, a fundamental conflict arises that is not easily resolved.
Identity Governance Administration was created to address this conflict. It defines a common framework used by business and technology organizations in developing a practical program to manage all aspects of governing access to physical and logical resources.
In this report, we will show the evolution of IGA from being just a part of IT to a modern business-oriented framework, including what solutions are available today, future trends and recommendations for TechVision Research clients. This report will help our clients build and sustain an effective IGA program.
This report covers:
- History and evolution of Identity and Access Governance: from paper forms to IGA platforms
- Responsibilities within IGA and the fundamental conflict
- Main historical shifts in IGA: subject shift, focus shift and responsibility shift
- Business-oriented model: description, available solutions, and trends
- People-centric approach in IGA policies and governance
- TechVision recommendations