Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » 5 Questions Security Teams Should Ask When Evaluating IAM Tools
Cybersecurity

5 Questions Security Teams Should Ask When Evaluating IAM Tools

Robert WoodBy Robert WoodApril 27, 20224 Mins Read
Facebook Twitter LinkedIn Email
Evaluating IAM Tools
Share
Facebook Twitter LinkedIn Email

Identity and access management (IAM) is quickly becoming one of the foremost focal points for security teams. Boundaries are shifting and disappearing, at the same time, services are becoming more interconnected than ever. This trend is underscored along with all of the market discussion around zero trust.

Permissions guide access to data and resources. Permissions are attached to an identity, whether either human or machine. There are a number of solutions that can support security teams in a better IAM posture. This article will explore various questions that security teams should ask themselves in evaluating IAM tools.

Are the Devices We Use Supported by IAM?

We’re a Windows shop. We’re a Mac shop. We’re all developers and use Linux. Some organizations leverage a BYOD model. Some use mobile devices as part of their standard operations. Some have rigorous system images that are managed and issued across the user base.

Having an IAM solution that can integrate with device management solutions can open up new opportunities for the application of certain security policies, such as “user X can only log into service Y if they are using a managed device.”

How Does the Cost Scale Over Time?

The pricing options of each solution are going to differ. You might find pricing by the tier of features, the number of active users, or the number of integrations. The most important thing to consider here is how your organization looks today and how it will grow over the coming 3-5 years.

If you’re signing up for a per-user pricing model, that needs to be considered alongside all the other solutions that do it the same way. The cost for every employee or contractor can steadily creep upwards on a monthly or annual basis if you’re not mindful.

Does IAM Support Adaptive Authorization Decisions?

Depending on the conditions of a user’s session, their authorization capabilities change. Traditionally, authorization and permissions have been a very static concept: a user is placed in a group and, from there, they have access to certain things until they’re no longer in that group. If a user logs in from a new device, like a notably different location, perhaps you don’t want them accessing some of what they normally do.

Zero trust frameworks often discuss this notion of a policy or risk engine that makes decisions on whether a user should get access to a particular resource depending on a number of factors. Some solutions have productized these capabilities, others should simply be flexible enough to be incorporated into a broader IAM tools ecosystem.

What Kind of Authentication Options are Available?

Solutions should ideally be capable of moving beyond username and password authentication methods. This is especially true considering the wide range of multi-factor authentication (MFA) modes available, from FIDO to push-based apps.

There’s a very positive trend around making security easier for end-users—making the secure way to do something, the easy way. IAM solutions should be ready to support this trend by supporting options like passwordless authentication, FIDO-based MFA, and more.

What’s the Availability of the Service Like?

An IAM service that has availability issues can be crippling to an organization where people need to access things to do their work. Seeking out solutions with a solid track record of solution availability is important. But because things can and do happen with outages, especially if there’s a supplier of theirs which has an issue, it’s important for you to consider the contingency plan.

For some organizations, blips in downtime may be acceptable and normal. However, for others, it may be extremely damaging. Can you switch to an alternative means of access in the event of an emergency? How long could you or would you want to sustain that?


Want to gain more insights from Cloud Wars Expo?
Starting on July 20th, more than 40 hours of on-demand cloud education content will be available for free to Acceleration Economy Subscribers.

CLIck here to get your cloud wars expo on-demand pass noW
Cloud Wars Expo header image

authentication Cloud Wars Cloud Wars Archive management Road To Cloud Wars Expo scale
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions

May 22, 2025

Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow

May 22, 2025

OCI and IBM Expand Partnership, Customer Wins Incoming

May 21, 2025

ServiceNow AI Maturity Index: A 5-Stage Framework to Accelerate Enterprise AI Success

May 21, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions
  • SAP Says Reports of Applications’ Death Are Greatly Exaggerated!
  • How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers
  • Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow
  • SAP: Agents Will Enhance Apps, Not Turn to CRUD

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.