Digital identity

Improving time-to-value and lowering risk

US Solutions

Identity and access management is both a business process and technology problem. Organizations require teams with blended expertise in identity-related business processes and technical knowledge of identity systems. The presence of both will result in successful identity and access management programs.

Identity is the common security denominator. An organization will be able to effectively secure an enterprise in a cloud and mobile world by placing identity at the center of a security framework (e.g., zero trust). Knowing the user is crucial—otherwise, no other system access control or security matters.

Protiviti approaches identity and access management from a risk management perspective, instead of a technology-first method. Identity and access management aligns and scales more effectively when it addresses key business risks, increasing value and sustainability through a phased identity program.

US Solutions

Our identity and access management services

Directory services

Identity directory services—on-premise or in the cloud —are the cornerstone of an identity and access management program. Develop a solid directory structure to enforce least privilege security and reduce authentication friction.

 

Access management implementation

Establish secure, seamless sign-in and adaptive authentication using multiple factors, while providing a frictionless experience for end users.

 

BLOG

Blog Generic 2

Part 1: How Mature is Your Privileged Access Management (PAM) Program?

In this two-part series, we look at the factors needed for a Privileged Access Management program to be considered mature.  In today’s dynamic world, businesses are constantly being asked to become more agile, more nimble, and more forward...
Read More

BLOG

Blog Generic 4

How to Establish an IAM Steering Committee

About to embark on a journey in the world of identity? Looking to atone for past Identity and Access Management (IAM) or Identity Governance and Administration (IGA) sins? If so, with an IAM roadmap in place, one of the first steps we recommend is to...
Read More

PODCAST

PODCAST 76 | IAM AS A CAREER, IDPRO WITH IAN GLAZER

Podcast 96 | The Convergence of Identity Proofing and Passwordless Technologies with Mike Engle

Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics...
Read More

WHITEPAPER

Towards an Identity-Centric Security Strategy

Towards an Identity-Centric Security Strategy

Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a...

Enhanced security increases your ability to respond to new threats

Our digital identity approach


Protiviti supports your cybersecurity needs with our digital-centric identity and access management approach. We integrate a digital identity infrastructure across your cybersecurity environment to create a more secure, consistent, and reliable identity environment. This enhanced security increases your adaptivity and responsiveness to next-generation threats.


Enhanced security increases your ability to respond to new threats

CISO Next initiative

What is next for CISOs?


The CISO Next initiative produces content and events crafted exclusively for CISOs, with CISOs. The resources focus on what CISOs need to succeed. The first step is finding out “What CISO type are you?”

Get Involved

CISO Next initiative

Our Leaders

Terry Jost
Terry is a Managing Director and the Global Security & Privacy Segment Leader. He has over 25 years of experience in senior leadership and advisory roles relating to cybersecurity, transformative digital solutions, business strategy services and mitigating business ...
Victor Barris
Victor is a Managing Director responsible for driving the Digital Identity Partner Ecosystem and providing strategic direction for emerging partner delivery practices. Victor brings over 23 years of experience in cybersecurity and identity consulting.
Samitha Amarasiri
Samitha is a Managing Director in our Digital Identity practice focusing on delivering identity governance and administration (IGA) solutions in the Northeast U.S. and the financial services industry. Samitha has experience transforming digital identity programs at some ...
Adam Steed
Adam Steed is a Senior Director in Protiviti’s Salt Lake City office. He brings over 20 years of experience in healthcare, banking, and e-commerce. Adam helps organisations move identity management beyond compliance to more optimised processes with enhanced security. ...

Case Studies

Identity and access management programs continue to struggle—more than 20 years after the industry’s inception. After reviewing this top 10 list of pitfalls, you may recognise these findings, including some that call for continuous monitoring to proactively mitigate cyber risks.

In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programs continue to struggle — and with good reason. There is a lot that can go wrong with an IAM program.

Lack of funding, treating IAM like a project and not a program, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that can impact the ability for an IAM program to be successful. That’s where this e-book comes in. The team at Protiviti has decades of real world, hands-on experience not only doing IAM, but doing IAM well. As a team, we collectively work with dozens of clients per year and have seen some commonalities for struggling IAM programs. In putting together this top ten list, you may recognise some that apply to you and some that you may want to keep an eye out for so you can proactively plan against those risks.

Learn more

Situation: The U.S. government needed outside expertise to establish a government-wide identity credentialing capability standard.

Value: Protiviti helped implement a government-wide identity credentialing capability and standard for vetting identity and access management solutions. The effort met the President's agenda to establish a means for authenticating users. The policy and governance were extended to the federal government's public key infrastructure.

Learn the essentials to successfully plan and implement an effective identity management strategy.

Identity management doesn’t happen overnight; there’s no “Easy” button to press, or magic snap-of-the-fingers instant fix. In fact, identity management has transformed into something far more complex than password authentication and simple security measures. It’s important to understand that jumping into a new technology instantaneously isn’t necessarily the right first step to ensuring a successful program.

Getting the keys to the kingdom has become harder than ever before. To do it the right way, you need an appropriate foundation in place for decision-making. This includes prioritising projects that will roll-up into an identity management, or IAM, program.

Learn more

Solving complex identity and access management issues for an organisation often requires finesse, collaboration and the ability to creatively meet the needs of all aspects of the business with a single solution. One global biopharmaceutical company discovered the power of collaboration as it worked to replace an existing access management implementation, harmonising two distinct populations(enterprise and manufacturing) representing 47,000 users.

The company knew it needed to replace its single sign-on (SSO) solution, as its existing technology was neither flexible nor strong enough for the organisation’s complex network of relationships and environments. Although each of the work groups presented its own unique challenges, the manufacturing team’s needs were considerably more complex.

Learn more

Loading...