What advanced identity analytics or continuous access controls is your organization using (or planning to implement)? Any lessons learned you can share regarding vendor selection or implementation?

2.4k viewscircle icon3 Comments
Sort by:
CISO23 days ago

We call it at Acsense: "Continuous Access Command and Control (CACC)
Any change is tested in a production-like sandbox. Any deployment to production is monitored and can be reversed just as quickly as it was deployed. Any change outside of the standard procedure is monitored and tagged for further review, unless it comes from HR or IGA, which are pre-approved.

Information Security Manager4 months ago

We are running IAM Analytics using PowerBI + Python combination. We also utilize Log Analytics workspace and Splunk as sources. This empowers us to do co-relation from multiple sources and produce data for better visibility, decision making and next actions. An example can be tracking MFA adoption using phishing resistant MFA. We can show how many managed devices we have which use modern MFA versus SMS etc. Our lesson learned during this journey is start small and expand. You are surrounded by pool of data. Using the data to your advantage is the key here.

Director of IT4 months ago

In order to implement continuous access controls the maturity of the organization regarding Identity Governance, Access Controls and Access Management must be very good. Most of the organization I know are still struggling with a consistent Identity Governance and Administration implementation across the business departments and application landscape. Therefore I cannot share valuable lessons learned for now. 

What advanced identity analytics or continuous access controls is your organization using (or planning to implement)? Any lessons learned you can share regarding vendor selection or implementation? | Gartner Peer Community