
What do you need for a successful IAM implementation?
Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. IAM is no IT party, but a change that affects business processes at all levels. Collaboration between different departments is therefore crucial. In this blog series, we asked him the most pressing questions about why IAM implementations are so often unsuccessful
What do you need for a successful IAM implementation?
“Identity governance and administration software (IGA) is a species of IAM software, supporting the automation of the joiner, mover and leaver (JML) processes in an organization and supporting authorization management by means of Role Based Access Control (RBAC).
To ensure that an implementation of this is successful, it is important to understand that a business case is required. IGA may be a software product, but by no means is it an IT tool. It supports business goals and as such, the business needs to be in control, define requirements and provision the budget.”
For some organizations, implementing an IGA tool is more necessary than for others, which is why André likes to add the following question himself:
What organizations will benefit from IGA software?
You now know that IGA is about automating the JML-processes. The more the merrier. So large companies will generally benefit more from automation than small companies. Our best guess: Over 500 or 1000 employees, having IGA is an absolute no brainer.
Second: IGA does support access governance by means of RBAC and account and authorization certification processes. In that case, the size of the organization is less of an issue. Governance, transparency and insight helps in all cases when operational risks needs to be managed. Size? Starting at 100 perhaps? There is no best practice, risk management is different for every
- So: over 500 employees/contractors, users:
IGA support efficiency and governance - From 100 to 500:
IGA mostly benefits governance (please, these are just some of our estimates)”
Related to this, what is the role of SonicBee?
The SonicBee business consultants advise organizations from a pragmatic business perspective on how to optimize the IAM situation. For example, in shaping the IAM visie and strategy before you consider purchasing a new IGA tool or if you already have an implementation running.
In the past, IGA software was mainly available to larger organizations. SonicBee did see the need for a less complex and costly variant for smaller organizations. That is why SonicBee developed SynerBee. Specifically for smaller organizations that want to have everything organized in a professional, simple and user-friendly way, without having to spend too much time, effort and money.
Background blog series
The installation of a new identity and access management software package is often approached as an ICT implementation. This not only brings risks, but also unnecessary costs and dissatisfied users. Companies grow and change. The digital age has brought about a transformation in many companies in which digital possibilities are increasingly used. This has resulted in many different applications and systems and sometimes a somewhat fragmented ICT landscape and decentralized organizational control. In doing so, there are more and more types of users using an organization’s digital assets. Such as employees, customers, partners, devices and things. In identity and access management, it is precisely important that these things are connected. Well, in a safe and thoughtful way. This blog series addresses this.