We participated in the 8th annual Gartner Identity & Access Management Summit (Nov 18 – 20, 2013) at Los Angeles. We were also a Silver Sponsor and are excited to gain validation on our offerings and more importantly for being on the right track. Our summaries of findings based on numerous interactions with industry experts as well as attendees from multiple verticals are as follows:
1) Several customers and prospects are ready to onboard vendors who bring in Access intelligence and analytics.
Access governance without intelligence and insights do not work and this missing piece continues to put a heavy burden while taking decisions and businesses today suffer due to calls made without full knowledge. The problem gets magnified by a huge factor while dealing with large data sets – several 100K users and 10’s of millions of entitlements. There is hence a burgeoning need for systems that do the heavy lifting and enable stakeholders to make the most informed decisions every single time.
2) Complexity, Cycle-times and Commerce are the bane of a successful implementation
The complexity of current day solutions mandate a certain degree of training and that entails time (which again is money).
Current application integration cycles on an average last for 6-9 months, in some cases 12 months, and beyond. Business are forced to wait out for 2 to 4 or more quarters before seeing some form of returns from their IAM strategies.
3) These pain-points invariably form the nemesis for a full implementation of IAM strategy and reaping the rewards.
When timelines increase and budgets shoot northwards, most of the business trigger the panic button and get into massive pressure to wrestle out some form of ROI immediately. This means cutting short of efforts to reach the grand (ideal) goals.
Our crystal ball says
We predict (rightly) a lot of consolidation in the months and years to come. Simple systems that provide just User Provisioning through federated identity/single-on are necessary but not sufficient. While it is good to review what access someone has, but not having the right provisioning capabilities means that business will dock at the “we are “almost there” port of call instead of the original “reaching where we want to be” destination.
Bottom line, customers would want to know “how” to manage the access life-cycle as a continual program and not just grant and forget about it. This involves several organization policies being formulated to drive those key activities like – From the moment a decision is being made to grant access to the point where it needs to be removed, all along gaining visibility on what happens when, with whom and why till the termination stage is reached.
With the IAM space maturing, the wants and needs of customers are going to expand continually. The winning edge will be granted to those solutions that offer
a) Agility in terms of deployment and usage – no more insane wait times and deep training cycles
b) Smarts to enable 360 visibility continually – run IAM as a continual program as opposed to deploy it and forget it
So, where do you think the next-gen IAM solutions are headed to?