Page 84 - Cyber Defense eMagazine February 2024
P. 84

selection  of  solutions  optimized  to  suit  the  business  needs,  the  ability  to  collaborate  and
                   seamlessly integrate is key for meeting future demands.
               •  Best of one world, worst of all others: Most platforms got their start by offering one great solution.
                   They then acquire one or more industry solutions in adjacent parts of IAM and position themselves
                   as a platform. But the level of integration is weak, and there is no added value unique to the
                   platform. In most cases, the added solutions to the platform are not leaders in their category but
                   are often second- or even third-tier, so customers adopting the platform are settling on subpar
                   technology for parts of their identity fabric.
               •  “Rip  and  replace”  is  for  bandages  only: IAM  consists  of  many  components.  Most  companies
                   already have several vendors in-house, providing Access Management (AM), Privileged Access
                   Management (PAM), Single-Sign On (SSO), Identity Threat Detection and Response (ITDR),
                   Customer Identity Management (CIAM) or closely related functionality like Security Information
                   and  Event  Management  (SIEM)  solutions.  Consolidation  will  take  a  long  time,  and  the
                   dependency on a single vendor is a risk in a highly dynamic, regulated environment. Adding a
                   component that is focused on open integration with all kinds of systems is beneficial, as it frees
                   you from dependency, and allows you to always make the solution decision optimized to your
                   business needs. Selecting best-of-breed  vendors,  lowers  the  risk of  functional  lacks  that can
                   become disruptive to the rest of your infrastructure in the process. Doing a “rip and replace” to
                   use the platform version is not ideal and adds unneeded costs to deployment.



            The lesson here is to be aware of the impact that platform decisions have on your ability to stay agile,
            scalable  and  simple.  Best-of-breed  solutions  are  highly  relevant  for  large  and  complex  enterprises.
            Platform players are often a good solution for enterprises that are small, face no regulation, have no
            complexity demands and are just dipping their toes in the IGA space. Evaluate your needs and do not
            compromise on functionality.




            Upgrade for your future security

            Today,  you’ve  likely  upgraded  your  music  collection  from  CDs;  now,  it’s  time  to  modernize  identity
            governance and administration (IGA) for your enterprise. Legacy systems consume time and resources
            due to custom code maintenance. But Software-as-a-Service (SaaS)-based IGA solutions offer efficiency
            and accessibility, and security automation is a central feature. Smaller, less complex organizations may
            benefit from platform players, but larger enterprises should prioritize functionality and open integration to
            meet evolving security and regulatory demands. Evaluate your needs and prioritize solutions that offer
            open integration and independence from the single-vendor trend, ensuring robust IGA that aligns with
            evolving security demands and regulatory requirements.












            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          84
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   79   80   81   82   83   84   85   86   87   88   89