Partner Insight: Top considerations for IAM innovation and deployment

clock • 3 min read
Partner Insight: Top considerations for IAM innovation and deployment

For the financial services sector, trust, security and identity are critical. These factors must be considered by IT leaders when adopting systems that permit user access.

Identity & Access Management (IAM) is the framework of technologies ensuring user identities are effectively managed. IAM systems guarantee the right users have the right access to resources through identification, authentication, and controlled access.

Computing's latest survey, featuring 150 IT leaders from medium-sized enterprises emphasises the biggest challenges for managing and deploying IAM solutions.

Driving change

Survey respondents recognise that IAM is capable of combating cybersecurity risks, and aiding regulatory compliance, IT workload, and competitive advantage. Amongst those surveyed, Cybersecurity risks were seen as the most important driver of IAM adoption and competitive advantage as the least.

This reflects the current global security context. In total, 81 per cent of companies surveyed had experienced cyber attacks since the beginning of the pandemic, with 38 per cent reporting at least a weekly attack on their digital platforms.

But IAM adoption has technical, management, and cultural dimensions which all need to be understood by IT leaders, especially in the financial sector where valuable sensitive data is managed.

Fitting in

Survey respondents said the most important factors when choosing an IAM solution are chiefly integration with current or future technology environments, followed equally by seamless user experience, an auditable solution and whether it is suited to hybrid environments.

For managing IAM systems the biggest challenges were seen as integration, privileged user and identity management, staff acceptance and compliance, data protection, and cost.

It is clear IT teams place high value on creating and assisting smooth secure processes for both consumers and employees. Customers experiencing complicated authentication processes may be encouraged to take their business elsewhere. Employees experiencing high friction services or barriers to their daily workflow will be less agile and less productive.

Maintaining reliable and robust protection is crucial for the financial sector. When choosing an IAM vendor, respondents reported suitable licensing models as the most important factor, followed by product roadmap and ongoing support, technical support, and initial or ongoing costs.

The research demonstrates IT leaders are experiencing challenges in identity management in the context of rapid digital transformation.

Friction implications such as dealing with separate IAM solutions could be an issue. 27 per cent of enterprises said they operate a single IAM solution, with 31 per cent operating two, and 25 per cent three. This has the potential to create complexities for staff and IT leaders managing IAM systems and resonates with survey respondents highlighting technical support as a key factor in choosing a vendor.

However, respondents currently operating IAM systems described high confidence in the security of their solutions, with most responses falling into ‘quite confident' and ‘very confident'. This appreciation emphasises IAM practicality.

Computing's research underlines IAM solutions as an opportunity for innovation within the financial sector, ensuring cyber-vigilance and low friction experiences for users. For IT leaders choosing the right vendor and solution must consider a range of factors. Providing safe secure access, for customers and employees alike, requires a security strategy focusing on identity.

To find out more about how IAM is driving innovation in the financial services sector, read the full report


This article is sponsored by Okta

You may also like
Digital transformation falls apart without access management


Seamless journeys are crucial to the digital experience

clock 05 December 2022 • 2 min read
Zero trust is addressing hybrid working challenges


IT leaders from legacy institutions and startups are all moving towards least-privilege

clock 01 December 2022 • 5 min read
What to expect at Deskflix: Identity & Access Management?

Security Technology

Learn about regulation, tech developments, system security and remote access.

clock 28 October 2022 • 1 min read
Most read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Checkmarx: 'It's very difficult for CISOs to know how to safely incorporate genAI'

Checkmarx: 'It's very difficult for CISOs to know how to safely incorporate genAI'

'It’s an unfortunate reality that developers have not traditionally been big fans of security'

clock 26 March 2024 • 5 min read
UK's biometrics commissioners steps down, signalling missteps

UK's biometrics commissioners steps down, signalling missteps

Home Office is ignoring new technologies

Muskan Arora
clock 31 January 2024 • 4 min read
Endpoint is the path of least resistance, says Threatlocker

Endpoint is the path of least resistance, says Threatlocker

IT Leaders Summit debates the true purpose of endpoint security.

Penny Horwood
clock 05 October 2023 • 2 min read