This IDC study aims to identify technologies and practices that collectively define identity governance solutions and evaluate the readiness and value associated with each one.
Once upon a time, companies didn't need governance; in fact, they did all their user management with a flat-file database or a spreadsheet full of names and IDs, and no one had the time to revisit existing entries except maybe annually. Today's advanced cybersecurity attacks have forced a change. Compromised identities are one of the leading attack venues and organizations need to pay close attention to who's doing what.
Identity governance can be expensive. A market leading solution can cost more to acquire and implement than any other complementary IAM component (directory, authentication, privileged access, etc.); yet a capable solution can be self-funding for larger organizations where password resets dominate help desk service requests and unused software licenses abound.
"Identity governance is a security discipline that can easily pay for itself by off-loading password reset requests, reclaiming unused software license subscriptions and providing push-button reports to satisfy governmental or industry compliance reporting requests." — Jay Bretzmann, program director, Identity and Digital Trust
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.