Identity analytics is the next evolution of the IGA market. It combines big data and advanced analytics to detect access-related risks and enhance IAM processes. This assessment defines how technical professionals can best apply identity analytics to their IGA efforts.
- Identity Analytics Defined
- Aligning Identity Analytics and the IGA Infrastructure
- Identity Analytics Use Cases
- Effective Access Certifications
- Continuous Risk Evaluation (Microcertifications)
- Contextual Access Requests and Approvals
- Intelligent Access Policies and Roles
- Governance Over Unstructured Data
- Account Cleanup
- Identity Analytics Market Landscape
- "Analytics" Market Affinities
- Differentiating Identity Analytics From Other Security Analytics Offerings
- Supporting Business Intelligence Initiatives With Identity Analytics
- Features and Functions
- Data Mining and Aggregation
- Identity Correlation and User Profiling
- Behavioral and Data Analytics
- Risk Scoring and Evaluation
- Data Presentation and Visualization
- Continuous Monitoring, Alerting and Remediation
- Architectural Components
- Data Services
- Analytics Platform
- Inputs and Outputs
- Presentation Services
Gartner Recommended Reading
©2020 Gartner, Inc. and/or its affiliates.
All rights reserved.
Gartner is a registered trademark of Gartner, Inc. and its affiliates.
This publication may not be reproduced or distributed in any form without Gartner’s prior written permission.
It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact.
While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information.
Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such.
Your access and use of this publication are governed by Gartner’s Usage Policy.
Gartner prides itself on its reputation for independence and objectivity.
Its research is produced independently by its research organization without input or influence from any third party.
For further information, see
Guiding Principles on Independence and Objectivity.