IAM is ready to drive the business—and revenue
September 30, 2021
Identity and access management (IAM) has evolved significantly from its origins in the early 2000s ... and now it's taking more leaps forward.
One example is the evolution of identity analytics as a core function, which is opening up new revenue streams and improving user experiences. This is one reason the identity analytics market is expected to reach $3.62 billion by 2025, growing at a CAGR of 27.8% from 2018 to 2025.
Some enterprises are adopting identity analytics along with new technologies like blockchain, which generates improved secure digital identities throughout the verification process. In addition, privacy-preserving features like self-sovereign identity can now empower users to select and share identifiable information about themselves to connected service providers.
These technologies help eliminate the need for users, including customers, to remember multiple credentials, which can be a security problem. Instead, users can now opt to use biometrics to authenticate and to authorize into services and service providers. This, in turn, enables providers to collect information about behaviors to improve user experiences and develop new services that can provide new sources of revenue.
New identity governance and administration (IGA) technologies also enable identity and access analytics to provide rich insight into user risk profiles, while identifying gaps such as over provisioning and access creep. Taking advantage of these insights to automate high-confidence access verification and low-confidence access removal can help save significant time and effort and reduce operational costs. According one estimate, a 10,000-employee company can save $3.5 million over three years through automated provisioning alone, with an estimated ROI of 300%.
Loyalty program management traditionally has been very complex to manage. With blockchain and a modern IGA solution, the middleman is eliminated, and the enterprise achieves a seamless user experience across the entire partner ecosystem. This improves user stickiness and provides enterprises access to richer user transactional data, which also can be used to create more meaningful and relevant client services and experiences.
In addition to cost reduction and manual effort, artificial intelligence and machine learning are driving benefits that include the decentralization of user access administration. In essence, it is offloading user lifecycle management to connected partners, helping to reduce manual effort and risk.
<<< Start >>>
<<< End >>>
IAM best practices include but are not limited to adopting standards-based services for identity management; using access management to reduce expensive customizations and complex integrations; and adopting software-as-a-service services to reduce capital and operational expenses and to eliminate expensive upgrades and platform changes.
As many enterprises adopt more cloud solutions, it has become more important to have business, technology and security alignment to drive enterprise value and revenue, reduce cost and meet stakeholder expectations. Thus, IAM will also play a key role in governing, managing risk and compliance in cloud, as well as driving business growth. Learn more about our digital identity services at www.accenture.com/digitalidentity.
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.
Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. All materials are intended for the original recipient only. The reproduction and distribution of this material is forbidden without express written permission from Accenture. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates. Given the inherent nature of threat intelligence, the content contained in this article is based on information gathered and understood at the time of its creation. It is subject to change. Accenture provides the information on an “as-is” basis without representation or warranty and accepts no liability for any action or failure to act taken in response to the information contained or referenced in this report.
Copyright © 2021 Accenture. All rights reserved.