User-provisioning solutions are maturing in function and capability, and the user-provisioning market continues to consolidate. As some identity and access management (IAM) technologies approach a commoditylike state, the boundaries between core IAM products, such as user provisioning and companion product sets, are blurring.
Core provisioning functionalities are similar across most vendors (such as workflow engines, approval processes, password management and "standard" connector sets). Therefore, provisioning vendors seek to differentiate their product sets from those of competitors through expanded IAM functionalities, such as:
- Role life cycle management
- Identity and access intelligence (IAI ? that is, audit, log correlation and management, analytics, monitoring, and reporting)
- Improved workflow options to improve business process management (BPM) and general governance, risk and compliance (GRC) integration
- Better integration with "adjacent" and relevant security technologies, such as security information and event management (SIEM), data loss prevention (DLP), network access control (NAC), and IT GRC management (GRCM) tools
- Improved integration with other suite components or IAM offerings from other vendors
Download this paper to learn more.