Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Security icon

Select and Implement an Identity and Access Management System

Vendor Evaluation

Unlock a Free Sample

View Storyboard

Solution Set Storyboard Thumbnail

Your Challenge

  • Identity and access management (IAM) solutions offer a wide range of features. Some focus on point solutions for multi-factor authentication (MFA), privileged access management (PAM), and single sign-on (SSO) capabilities, while some offer full-fledged IAM suites. You may struggle to determine which solution makes sense for your environment.
  • Many organizations get stuck trying to identify what their needs truly are when it comes to IAM.
  • The ultimate goal is to balance high ROI, low initial cost, high IT/operational benefits, and high business alignment – a challenging task that will require some compromises.

Our Advice

Critical Insight

IAM is for everyone, but a holistic solution is not (right now). There are two categories of IAM:

  1. Broad IAM solutions that offer suite-like options.
  2. Niche players that have point solutions (for example, offering a separate password management solution or separate MFA solutions).

Not everyone will need or be able to afford a full-fledged IAM suite – however, all organizations should be working toward that goal and keep it in mind as they begin to evaluate vendors. Look for a vendor that can grow with you, allowing you to add capabilities.

Impact and Result

  • Before you invest in IAM, consider how thorough your solution needs to be. There may be IAM alternatives that would work for you, you may need individual point solutions, or you may need a full IAM suite.
  • Determine which use case you align with most closely, whether you need improved operational efficiency, optimized user experience, or a full identity governance solution.
  • Based on your requirements, use the Vendor Landscape evaluation and associated tools to narrow down the list of vendors.
  • Plan the implementation of the IAM solution, ensuring that the implementation schedule is future-proofed. Whether you’re starting from on premise and eventually moving to the cloud or starting with point and eventually moving to broader IAM, you must establish where your organization is set to go with IAM before you can start.

Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should select and implement an IAM solution, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

2. Select an IAM solution

Investigate the vendor landscape, produce a vendor shortlist, draft and evaluate RFPs, and conduct vendor demonstrations to select the right IAM solution.

3. Plan the IAM implementation

Prepare for the IAM implementation and measure the value of the solution.

Guided Implementations

This guided implementation is a seven call advisory process.

Guided Implementation #1 - Launch the IAM project and collect requirements

Call #1 - Identify organizational fit for the technology.
Call #2 - Create the project plan.
Call #3 - Plan requirements gathering steps.

Guided Implementation #2 - Select your IAM solution

Call #1 - Discuss the use-case fit assessment results and the Vendor Landscape.
Call #2 - Contract review.

Guided Implementation #3 - Plan your IAM implementation

Call #1 - Create an implementation plan.
Call #2 - Discuss rollout of processes and handover to operations.