KuppingerCole Report
Whitepaper
By Richard Hill

IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud.

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service that supports the hybrid IT infrastructure organizations run today. This whitepaper describes the paradigm shift, the customer needs, and a solution to help businesses move forward in this hybrid IT environment.

1 Executive Summary

Traditionally, the IT environment has run within the walls of their perimeter. The Identity and Access Management (IAM) solutions were developed to ad ...

Login Free 30-day Select Access Get full Access

2 Highlights

  • Insight on the shift from on-premise to the hybrid IT environment
  • Identifying the significant IAM capabilities
  • Overview of the role of Access Go ...
Login Free 30-day Select Access Get full Access

3 Access Governance Today

Identity is at the core of any information security system and Identity and Access Management (IAM) gives the capabilities to manage these identities, ...

Login Free 30-day Select Access Get full Access

3.1 On-Premises IAM

Traditionally, the IT environment has run within the walls of their perimeter. The Identity and Access Management (IAM) solutions were developed to ad ...

Login Free 30-day Select Access Get full Access

3.2 Cloud IAM

With the advent of cloud services (IaaS, PaaS, SaaS), organizations were given new options for their IT infrastructure, platforms, and software. Motiv ...

Login Free 30-day Select Access Get full Access

3.3 Access Governance

Identity Governance and Administration (IGA) was initially driven by regulations such as SOX, that required organizations to ensure separation of duti ...

In the simplest terms, access governance manages who has access to what data, applications, and services. It must monitor and report on potential risk ...

Login Free 30-day Select Access Get full Access

3.4 The Hybrid Reality

The reality of today is that most organization’s IT data, applications and services are spread across both on-premises and cloud environments. Inevi ...

Login Free 30-day Select Access Get full Access

4 Emerging Access Governance Capabilities

Access Governance not only requires a solid foundation built upon strong strategic governance concepts, but it also requires powerful tools that can g ...

Login Free 30-day Select Access Get full Access

4.1 Cloud Access Security Broker (CASB)

Organizations are embracing the use of cloud services because of the benefits that they can bring in terms of speed of deployment, flexibility and pri ...

CASB solutions provides support for the cloud. It is inserted between cloud services and the on-premises organization that are using them. It improves ...

Login Free 30-day Select Access Get full Access

4.2 Analytics

Analytics has become a loaded term in that it has come to mean a broad range of things, but in its narrowest sense it is the ability to perform data a ...

Login Free 30-day Select Access Get full Access

4.3 Intelligence

Intelligence gives the ability to make access decisions that can be acted upon based on the patterns and trends found through data analytics. We have ...

Login Free 30-day Select Access Get full Access

4.4 Required Capabilities of the Hybrid IT

Traditional on-premises IAM that focus solely on internal IT are no longer sufficient with the advent of cloud services. Of course, there will still b ...

Login Free 30-day Select Access Get full Access

5 The Saviynt Approach to the Hybrid IT Challenge

Saviynt is the next-generation IGA platform that not only provides traditional identity governance, but also combines the ability to govern a user’s ...

Login Free 30-day Select Access Get full Access

5.1 Access Governance

Saviynt addresses the need of Access Governance to extend beyond the traditional boundary of an enterprise, as well as across infrastructure, applicat ...

Login Free 30-day Select Access Get full Access

5.2 Analytics & Intelligence

Saviynt is a risk-aware, threat-aware, intelligent platform driven by analytics. Their intelligence through analytics adds value to their modules such ...

Login Free 30-day Select Access Get full Access

5.3 Saviynt's Approach to CASB

Saviynt seeks to extend its support for the cloud with its next generation capabilities to improve on the CASB solution. It does this by filling the g ...

Login Free 30-day Select Access Get full Access

5.4 Integrations

Among others the Saviynt platform integrates with:

  • IDaaS (Identity as a Service) systems like Microsoft, Ping, Okta
  • Service specific Cloud Acce ...
Login Free 30-day Select Access Get full Access

6 Summary and Recommendations

The hybrid reality is upon us. IT organizations, not already in the midst of leveraging cloud services, need to plan and prepare.

The need for ...

Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top