The increasing popularity of the term “Identity Security”, coupled with the explosive growth in the number of identity security vendors, bears testament to the fact that security starts and often ends with identity. But with so many tools, so many processes moving part making up the modern identity fabric, do you really know what is really happening behind the curtain and inside all that IAM infrastructure? Accounts are created, entitlements are assigned, users authenticate, access is authorized and data is accessed. This process not only happens for the standard users coming in through a nicely federated, passwordless authentication solution, but also for your admins, your agents and the service accounts they leverage. The very process of IAM is happening across all of your infrastructure, from legacy applications to cloud services and beyond into IaaS and the SaaS services you subscribe to. But when something changes in that flow, the configuration for an IdP or a relying system changes, or an update is made to profile configuration, orchestration flow or group assignment - will you identify the change, understand its meaning and forecast its overall risk to your identity security posture? Are you instrumented for the future state of IAM?
In his talk, KuppingerCole Fellow Analyst Darran Rolls, former CISO and CTO at SailPoint, will outline how Identity instrumentation and orchestration technology can help reverse-engineer the authentication and authorization flow of applications and provide key insights into configuration and usage. He will explain how the future state of IGA, ITDR, and overall Identity Security must deliver instrumentation to allow visibility, configuration and usage information for all applications and will highlight how emerging technologies can help fill this gap.