Perkins and Ant, 2005

Type

Analyst Report

Title

Consider Identity and Access Management as a Process, Not a Technology

Authors

Perkins, E.L., Ant, A.

Year

2005

Harvard

Perkins, E.L., Ant, A. (2005). Consider Identity and Access Management as a Process, Not a Technology (Analyst Report No. G00129998). Gartner.

Report Number

G00129998

Abstract

This Research Note complements earlier Gartner research that has discussed the technology of identity and access management (IAM) — what is IAM, the component technology of IAM, the vendors in the IAM market, and the maturity and growth of IAM. Recent Gartner research addressing business and information security requirements for IAM — covering regulatory issues for compliance, addressing controls for audit and reporting, and aiding in improving the overall privacy and access integrity of information for enterprises and institutions — has remained largely focused on how technology solutions can assist in addressing those requirements.

In this Research Note, we look at the basic processes of managing identity. We recommend three core processes and associated subprocesses that may be used as starting points for planning IAM projects, particularly when you need to provide a project justification. We draw conclusions regarding impacts of those processes on the IAM vendor market.

(Perkins and Ant, 2005, p. 1)


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.