Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. IAM is no IT party but a change affecting all business processes. Collaboration between different departments is therefore crucial. In this blog series, we asked him the most pressing questions about why IAM implementations are so often unsuccessful. This article is all about the necessary ingredients for successful IAM implementation. So what do we need? Read all about it!
What do you need for a successful IAM implementation?
“Identity governance and administration software (IGA) is a species of IAM software, supporting the automation of the joiner, mover and leaver (JML) processes in an organization and supporting authorization management by means of Role Based Access Control (RBAC).
To ensure that an implementation of this is successful, it is important to understand that a business case is required. IGA may be a software product, but by no means is it an IT tool. It supports business goals and as such, the business needs to be in control, define requirements and provision the budget.”
For some organizations, implementing an IGA tool is more necessary than for others, which is why André likes to add the following question himself:
What organizations will benefit from IGA software?
You now know that IGA is about automating the JML-processes. The more the merrier. So large companies will generally benefit more from automation than small companies. Our best guess: Over 500 or 1000 employees, having IGA is an absolute no brainer.
Second: IGA supports access governance through RBAC and account and authorization certification processes. In that case, the size of the organization is less of an issue. Governance, transparency and insight helps in all cases when operational risks needs to be managed. Size? Starting at 100 perhaps? There is no best practice, risk management is different for every
- So: over 500 employees/contractors, users:
IGA support efficiency and governance
- From 100 to 500:
IGA mostly benefits governance (please, these are just some of our estimates)”
Related to this, what is the role of SonicBee?
The SonicBee business consultants advise organizations from a pragmatic business perspective on how to optimize the IAM situation. For example, in shaping the IAM visie and strategy before you consider purchasing a new IGA tool or if you already have an implementation running.
In the past, IGA software was mainly available to larger organizations. SonicBee did see the need for a less complex and costly variant for smaller organizations. That is why SonicBee developed SynerBee. Specifically for smaller organizations that want to have everything organized in a professional, simple and user-friendly way, without having to spend too much time, effort and money.
Background blog series
The installation of a new identity and access management software package is often approached as an ICT implementation. This not only brings risks but also unnecessary costs and dissatisfied users. Companies grow and change. The digital age has transformed many companies, in which digital possibilities are increasingly used. This has resulted in many applications and systems and, occasionally, a somewhat fragmented ICT landscape and decentralized organizational control. In doing so, more and more types of users use an organization’s digital assets. Such as employees, customers, partners, devices, and things. In identity and access management, it is precisely important that these things are connected. Well, in a safe and thoughtful way. This blog series addresses this.