What advanced identity analytics or continuous access controls is your organization using (or planning to implement)? Any lessons learned you can share regarding vendor selection or implementation?

1.5k viewscircle icon2 Comments
Sort by:
Information Security Manager2 months ago

We are running IAM Analytics using PowerBI + Python combination. We also utilize Log Analytics workspace and Splunk as sources. This empowers us to do co-relation from multiple sources and produce data for better visibility, decision making and next actions. An example can be tracking MFA adoption using phishing resistant MFA. We can show how many managed devices we have which use modern MFA versus SMS etc. Our lesson learned during this journey is start small and expand. You are surrounded by pool of data. Using the data to your advantage is the key here.

Director of IT2 months ago

In order to implement continuous access controls the maturity of the organization regarding Identity Governance, Access Controls and Access Management must be very good. Most of the organization I know are still struggling with a consistent Identity Governance and Administration implementation across the business departments and application landscape. Therefore I cannot share valuable lessons learned for now. 

Content you might like

Yes45%

We’re updating cyber governance structure to include it40%

No13%

Other/show results3%

View Results

Excellent (more than enough)9%

Good (we have enough to reach our goals)52%

Acceptable (could be better but we make do)36%

Poor/unacceptable (more funding needed ASAP)3%

Unsure / other

View Results