KuppingerCole Executive View on Active Roles

Digital identity is a critical business-enabling technology for all types of organizations, including Small to MidSize Businesses (SMBs). However, as is borne out by cybercrime reports year-after-year, digital identity is also a primary vector through which SMBs are attacked.

The risks of not having well-maintained and secure IAM solutions - can be great, ranging from lower productivity to unwittingly becoming a vector of attack to other members in a supply chain.

Organizations can have a variety of use cases and technical requirements they need to meet with IAM. Regarding use cases, everyone needs B2E IAM, many need B2B, and some need B2C. Many organizations also utilize various cloud based SaaS applications but do not have the IAM functions centralized or even under control.

For all organizations, getting a grip on the environments such as Microsoft Active Directory and Azure ADrequires capabilities beyond what enterprise-grade IGA (Identity Governance and Administration) tools commonly deliver. This report examines three major categories of functions within IAM to look at.


Download Now!