Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityAccess ManagementCybersecurity News

Will the convergence of IGA, PAM and AM fix the fractured identity landscape?

By Chris Schueler
identity-management-freepik23957.jpg
November 29, 2021

Identity is fast becoming less of a tool and more of a strategic framework to secure digital assets and protect data privacy. As a result, when it comes to growing market-share, identity access management (IAM) vendors are looking to grab a larger percentage of the business. 


Identity protects digital assets, supports digital transformation initiatives, and bolsters Personal Identifiable Information (PII) privacy, using NIST-based security standards and best practices. It enables organizations to centrally manage their expanding perimeter of mobile and work from anywhere users, and on-premises, multi-cloud, and hybrid infrastructure environments. 


A comprehensive identity platform allows for a common user experience across multiple applications and systems (both legacy and modern) and allows consumers and distributed workforces to use the same authentication method to access applications and resources across different enterprises.


Converging the identity pillars

Identity has three distinct pillars; identity governance administration (IGA), privileged access management (PAM), and access management (AM). There are dozens of vendors that offer one of these pillars. In the past, they referred to their products as identity tools. However, many now call their products identity platforms as they begin building more integrated capabilities. Albeit, these are vendor-specific platforms, and no vendor today offers an identity platform with complete IGA, PAM and AM capabilities. 


Automation and interoperability of the three pillars are critical to ensure all applications, systems, APIs, policies, and processes are synergistic. Identity plays a pivotal role within an organization’s security stack. However, stakeholder roles are spread across IT infrastructure, security operations, and compliance to manage regulatory risk.


Digital transformation, and the implementation of identity as part of that initiative, is a journey and each organization is at a different stage in that journey. Organizations with more mature identity infrastructure have typically accumulated many different and disparate identity tools. Most have created a complex infrastructure with limited integration, and they still have yet to implement identity throughout all their applications. They typically have legacy and modern identity tools that are on-premises and cloud-based. Organizations with less mature identity capabilities might only have cloud-based identity solutions. They often have limited policies and processes that are not fully thought out. In either case, the security and privacy risk associated with both is high.


No matter where the organization is in their digital transformation, the identity platform needs to be adaptable and robust enough to support all situations and environments. Identity encompasses multiple senior executives, including leaders of IT (CIO), compliance (CCO), and security (CISO). Each stakeholder has their own specific goals and objectives, and the value that identity represents is different for each of them.


The identity platform impact on users

An identity platform will not negatively impact users by adding friction to their experience. A vendor-agnostic converged platform will not lock an organization into any specific vendor. It will adapt to the customer needs and accommodate having their brand on the interface. This is important to many organizations because identity infrastructure is so intrinsic to their business operations and culture.


Business leaders in charge of IT, compliance and security rely upon identity to ensure the right users have the appropriate access to digital resources. However, identity platform convergence means different things to different people. Because of the fractured identity landscape, vendors are looking to grow market share to increase their piece of the identity pie. Often, when one company buys another, they are eliminating their competition, which is not necessarily a good thing for customers. 


A converged identity platform helps make organizations more secure, compliant with regulations and provides a faster return on investment. It enables greater gains in efficiency for user and application on/off-boarding while supporting and enhancing the auditing process. It simplifies how users log into systems and apps and maximizes and optimizes existing identity tools, policies, and processes.


The positives and negatives of convergence

It is fair to say that convergence can be good for vendors but challenging for users. For many organizations, the prospect of any software platform conversion means more costs, more and possibly different licenses, and added usage. Convergence can also eliminate competition, potentially leading to higher prices and fewer choices. 


When a product goes through an upgrade, or its lifecycle is at an end-of-life stage, the customer usually pays the price. A vendor-agnostic identity platform should protect organizations from such an impact. In fact, the organization should be able to replace that product with a newer, better solution that may be more cost-effective. That is the beauty of a vendor-agnostic identity platform.


Even within a mature market like IGA, new IGA vendors are bringing modern technology at competitive prices, encouraging pricing stability. IGA is the most mature identity technology, while PAM is the least mature, mainly because privileged access personnel tasked with implementing PAM are often resistant. This is due to the potential friction on both the administrative and end-user sides. This resistance is a challenge that identity platforms face if they have simply cobbled together various capabilities and critical functions without focusing on the user experience. The key is to have a user interface that remains consistent, even if the underlying technology changes.


Managed identity service providers tend to be vendor agnostic. If a particular vendor needs to be swapped out, users are never impacted. All the changes are executed on the back-end, and the user experience and workflow processes remain consistent by having a common dashboard or interface separated from the underlying technologies. This is a key advantage of a comprehensive identity platform, as all the identity functions are integrated specifically to eliminate user friction. 


While today there is a fractured identity landscape, over the next 3-5 years, I expect there will be a convergence of the IGA, PAM and AM pillars. Identity vendors are beginning to expand their offerings, either through partnerships, by technology acquisitions, or vendor convergence; and from in-house development through organic expansion of capabilities.

KEYWORDS: authentication digital transformation identity (ID) management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris schueler

Chris Schueler is Chief Executive Officer at Simeio Solutions where he drives the overall vision and strategy. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man standing in front of window

    Will decentralized identity unlock the future of identity protection?

    See More
  • Jeff Reich podcast news header

    Navigating the identity security landscape

    See More
  • person using laptop with latte

    The varied landscape of consumer fraud

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing