Navigating in Information Technology


In the past, systems were used by a small set of users mostly within the trusted circle of their organization. The circle of trust has however widened considerably. Today’s computer systems are used by a variety of users across many organizations and geographical areas and via different channels and devices.

Organizations must make their information assets available to many users but simultaneously protect these against unauthorized access.

How to achieve the right balance for your organization? The answer lies within the discipline of Identity and Access Management (IAM).

By defining and implementing a strategic IAM Architecture, an organization will be able to strike the balance between availability and protection and determine the appropriate level of access control for their business processes.

Our IAM services portfolio

Our product agnostic approach enables us to assist clients during the development of a strategic IAM Architecture and the definition of an IAM Program Roadmap for implementation thereof. Our services portfolio consists of:

  • Development of conceptual and logical IAM architectures and, due to in-depth knowledge of leading IAM products, our consultants are very capable to develop product specific IAM solution architectures.
  • Definition of IAM program roadmaps, migration strategies and the subsequent project management of IAM projects.
  • Additional services like development of business value propositions, definition of IAM requirements and assisting customers during the evaluation of IAM products.

Also deliverables like Information Security Policies for Access Control and Application Security Architectures belong to our portfolio.

Architecture Development Kit

In order to fast-track the development of an IAM Architecture we make use of an extensive collection of building blocks consisting of proven models and processes, reusable reference architectures, and consistent and repeatable methods. These components of our Architecture Development Kit (ADK) are product agnostic but have proven to work when implemented in IAM products of various major vendors.

The ADK consists of our unique IAM Services model, an elaborated set of IAM Architecture principles and patterns and a thorough description of all relevant IAM concepts and definitions. Furthermore we rely on standardized components, models and approaches for e.g.:

  • Role modelling and application modelling
  • IAM processes and use cases
  • IAM administration consisting of an administrative model, governance structure, definition of roles and responsibilities and a blueprint for an IAM administrative organization.

These components can of course be customized according to specific clients' needs or to certain product specific requirements.

Learn more about our ADK...