KuppingerCole Report
Leadership Brief
By Christopher Schütze

How to set up your IAM organization

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs and IAM Security Officers are struggling to promote and develop the maturity of skills in the silos of technical identity management services. Adapting the structure of IAM organizations so that they are based on a service capability model helps to address key challenges in managing a broad portfolio. In this Leadership Brief, the most important topics about a complete IAM organization and some of the pitfalls to avoid are discussed.
By Christopher Schütze
chs@kuppingercole.com

1 Introduction

Not every Chief Information Security Officer (CISO) knows that IAM is possibly the most critical component in their portfolio. Delivering capabilities ...

Login Free 30-day Select Access Get full Access

2 Analysis

Management’s expectations of Identity and Access Management (IAM) programs are rarely met and CISO’s face the challenge of outlining the benefits ...

The topics are strongly focused and structured on technologies and portfolio capabilities, such as Access Management for Externals, or Identity Govern ...

Login Free 30-day Select Access Get full Access

3 Recommendations

Sometimes a step back is a step forward. This should be the focus on the question “How to set up your IAM organization”. But that does not mean to ...

Especially within existing organizations, some of the building blocks exist, some twice and others are missing. Therefore, it is essential to map exis ...

Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top