What advanced identity analytics or continuous access controls is your organization using (or planning to implement)? Any lessons learned you can share regarding vendor selection or implementation?

1.4k viewscircle icon2 Comments
Sort by:
Information Security Managera month ago

We are running IAM Analytics using PowerBI + Python combination. We also utilize Log Analytics workspace and Splunk as sources. This empowers us to do co-relation from multiple sources and produce data for better visibility, decision making and next actions. An example can be tracking MFA adoption using phishing resistant MFA. We can show how many managed devices we have which use modern MFA versus SMS etc. Our lesson learned during this journey is start small and expand. You are surrounded by pool of data. Using the data to your advantage is the key here.

Director of ITa month ago

In order to implement continuous access controls the maturity of the organization regarding Identity Governance, Access Controls and Access Management must be very good. Most of the organization I know are still struggling with a consistent Identity Governance and Administration implementation across the business departments and application landscape. Therefore I cannot share valuable lessons learned for now. 

Content you might like

< 10%36%

10-20%29%

21-30%18%

31-40%7%

41-50%4%

51-60%2%

61-70%

71-80%

> 80%1%

View Results

Strongly agree7%

Agree71%

Neutral18%

Disagree3%

Strongly disagree

Unsure (explain in the comments)

View Results