What We Offer
We start with award winning IAM software, then wrap it in expert services and a SaaS delivery model. The result is a unified solution that’s designed from the ground up to be accessible to the mid market.
The Software
End User experience
End users of our platform have a simple secure one-stop portal for accessing their every day applications. The dashboard gives them clear and unambiguous paths for common actions like access requests, as well as advanced actions like access reviews.
Admin experience
Administrators of our solution have a powerful yet simplified all-in-one interface for managing setup, configuration and daily engagement with their identity and access management platform.
The Services
We support our software offering with the services and processes you’ll need to get started and maintain a rock solid IAM practice.
Assessment
Every project we start begins with an Assessment phase. We’ll work with your team through a series of steps to identify where your organization currently resides on the “IAM spectrum”. We’ll then provide a tool-agnostic report that will help you identify your next steps.
Our IAM Maturity Model provides independent assessment criteria that can be used to measure your current state, to efficiently decide where to go next as well as provide benchmarks for measuring progress against your goals.
- Requirements gathering
- Maturity leveling
- Gap Analysis
- Vendor assessment
- IAM Roadmap
- Implementation planning
Implementation
While some of the implementation specifics differ between our Access Management tools and IGA (Identity Governance and Administration), the core services remain the same. Our team will take on your complete implementation project, from requirements validation to go-live.
Application on-boarding
IAM implementation is just the beginning. Your highest priority applications are onboarded into your IAM platform initially – but most organizations have dozens if not hundreds of applications that should be onboarded. We’ll help you get a handle on all the applications and their owners across your organization, prioritize which ones should be onboarded first, and project manage the step by step process of bringing them onboard.
Steady State operations
Once you’re up and running, we’ll help keep you there. This includes 24 x 7 Operational Support for your IDaaS platform, Level 2 and Level 3 Incident handling, and Management of incidents from identification to resolution.
Ongoing Access certification
The one constant in every organization is change. People join, people change roles, some leave, some return. Applications and how they’re used by your staff change too. Access reviews are the ongoing effort to ensure your application entitlements are up to date with the current reality of your business. There are best practices for performing this task efficiently and gracefully, and our team has expert dedicated resources to help.
Audit Support
As organizations grow and evolve, maintaining a robust and flexible IAM system becomes ever more critical. It only makes sense to periodically review past assumptions and verify that best practices are being followed.
That said… nobody loves an audit. We’ll support your team in navigating these waters efficiently and keep your IAM practice in tip top shape.
Training
One of the singular advantages of a Converged IAM system is that your users only need to learn a single platform (vs 4, or 5, or…). And our platform of choice has great UX and a solid built-in Guided Help system.
That said, everyone could benefit from formal training. We operate a registered training school to help students get certified on IAM fundamentals as well as hands-on platform specific know how.
Thought Leadership
Cybersecurity and IAM are rapidly evolving. We stay on top of trends, new ideas and new techniques in the industry and we’ll help guide your team on what’s now and what’s next.
