


It is not easy to calculate the return on investments when it comes to IGA systems. Microsoft offers lower-cost solutions attracting a broader audience. Oracle and IBM over a range of years remain quite at the top. Okta, which gained the most place in the report, was praised by Gartner due to its rapid implementation, reliability, and support level. All the leaders in the new magic quadrant have an income of $100 million or more, although many of them are still building this income on older products released to the market in the 1990s. The leaders are six vendors - Oracle, IBM, Microsoft, CA Technologies, Okta, and PingIdentity. In 2017, Gartner updated its Magic Quadrant highlighting 15 solution providers offering IDaaS models. IGA system market has grown dramatically over last 10 years as new players entered it. Often, before the merged companies move onto a single IT structure, a certain, maybe even a long time, they remain working in their old IT systems, while gaining access to new ones to perform the same tasks. With such reorganizations, obviously, one of the key issues is the transformation of the IT landscape. Reorganizations of business through mergers and acquisitions


The need to introduce IGA in the organization is subject to certain criteria, as follows: A good result at the end of the consulting stage is the development of a role-based access control model.Īssessing the relevance of the system to the existing IT landscape in the organization, its functionality and flexibility are the key principles to be considered when selecting an IGA system. Already at this stage, "distortions" can be identified, which are to be fixed best before the IGA system implementation itself.Īt the preliminary stage of implementation, the organization must go through external or internal consulting, the results of which should formalize the appropriate access management processes, and refine the existing information systems, first, the personnel management infrastructure. Organizations planning to implement and further develop IGA system should systematize and structure these processes in advance. The "maturity" of these processes directly affects the quality of the implementation of the IGA system. Moreover, here we are talking mostly about personnel management, including identity and access management. The implementation of the Identity Governance and Administration solution, like any IT system that automates business processes, cannot be done without serious changes in the business processes of the organization. Optimizing the work of users in information systems, as well as IT staff.Optimizing the information systems load.Enhancing IT-systems information security.IGA solves the following tasks important for IT infrastructure of an enterprise:
