KuppingerCole Report
Leadership Brief
By Warwick Ashford

Typical Risks and Pitfalls for IGA Projects

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effective Identity Governance & Administration (IGA) capability has never been greater. This leadership brief outlines common risks and pitfalls of enterprise IGA projects and how they can be avoided.

1 Executive Summary

Digital identities are at the heart of Digital Transformation, Information Security and Privacy Therefore it has never been more important for enterpr ...

Login Free 30-day Select Access Get full Access

2 Analysis

Identity Governance and Administration (IGA) is a key element of any organization’s IAM architecture, spanning the administration and audit & analyt ...

Login Free 30-day Select Access Get full Access

2.1 Business alignment

Without executive support for an IGA project, it can be extremely difficult to get the necessary funding and assign associated responsibilities to peo ...

Login Free 30-day Select Access Get full Access

2.2 Organization

Because IGA projects typically span an entire organization and involve both technical and business teams, failure to ensure that policies and processe ...

Login Free 30-day Select Access Get full Access

2.3 Implementation

Complexity is the enemy of success in most projects, and this is particularly true when it comes to IGA projects which typically involved a wide range ...

Login Free 30-day Select Access Get full Access

2.4 Planning

Complex projects are typically difficult to control and tend to be prone to delays and failure. Therefore, avoid a “big bang approach” and divide ...

Login Free 30-day Select Access Get full Access

2.5 Technology

Choosing the right IGA product is extremely important. Choosing the wrong product or trying to get value from existing failed products can lead to pro ...

Login Free 30-day Select Access Get full Access

3 Recommendations

The benefits of IGA are well understood by the business. Yet, business is still often reticent to fund new IGA projects because the ongoing failure of ...

Login Free 30-day Select Access Get full Access

3.1 Business alignment

  • Explain the business value of proposed IGA projects in clear, simple terms to get executive support
  • Ensure the business drives projects and leads ...
Login Free 30-day Select Access Get full Access

3.2 Organization

  • Create a cross functional group to create, support and report on IGA project policies and processes
  • Fill any skills gaps with specialists and set ...
Login Free 30-day Select Access Get full Access

3.3 Implementation

  • Demonstrate the success of IGA deployments early on to build credibility and gather support
  • Implement consistent, logical architectures that allow ...
Login Free 30-day Select Access Get full Access

3.4 Planning

  • Make the biggest business benefit of an IGA program the overall goal
  • Scope projects correctly by taking IGA maturity, business needs, IGA gaps an ...
Login Free 30-day Select Access Get full Access

3.5 Technology

  • Switch to cloud-based IGA wherever possible to enable shorter deployment cycles, faster upgrades and lower TCO
  • Conduct a pilot installation under ...
Login Free 30-day Select Access Get full Access

Copyright

©2020 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top