[MUSIC PLAYING] Identity security is not a product or a program, but a journey consisting of multiple programs in different areas that evolve over time as your organization grows and your business needs change. And user lifecycle management is often the first step in this journey. Creating a program for onboarding employees and providing them the accounts and entitlements they need to do their job, adjusting and attesting to that access as they move throughout their career, and eventually removing those entitlements in a timely manner when they leave the organization.
Now, most organizations are using Active Directory and/or Entra ID to provide the bulk of their access and entitlements. And those who are still early or yet to begin their identity journey can apply the 80-20 rule and very quickly realize value by configuring user lifecycle management processes that focus on those primary target systems using an Active Directory management solution like One Identity Active Roles.
And yes, you may see the need for other identity governance features and provisioning to other target systems and realize the need for an IGA solution that can accomplish that piece of your identity journey. But you can get a quick win by focusing on that 80% or so that are provisioned via Active Directory, and using that as a springboard to enhance and streamline later implementation projects.
When you go to build a governance program, you've already identified your roles, cleaned up and standardized your data so that you can enable a reliable and automatable process in the first place, and set standards for how those processes are enacted and who has access to modify, or otherwise bypass them.
Then, when you move forward with more expansive identity security programs, you can leverage the work that's already been done, but still realize that value right now. And take advantage of the Active Directory management capabilities that you already have to gain control of the rest of that AD environment that is not traditionally in scope for an IGA program.
The bottom line is that organizations who heavily utilize Active Directory, a solution that's focused on managing that environment can not only cover your needs in managing the objects and data that are often out of scope for an IGA program, but can jumpstart that IGA program or otherwise supplement and enhance that IGA program.