Guides : Mar 30, 2018

Why Read This Report

Overall spending on cybersecurity technologies and staffing is at an all-time high, but statistics show that the average size of data breaches continue to rise, and a large percentage of hacking-related breaches leverage either stolen and/or weak passwords. These metrics show a clear misalignment between cybersecurity investments and outcomes. Higher education institutions are particularly rich targets for data breaches. This guidebook reviews the research and surveys the market to draw conclusions and make recommendations about how an IAM strategy should evolve to protect the institution’s business risks and goals.

Key Questions Answered

Report Features

Get Access

Tambellini members enjoy direct access to the industry’s top analysts, premium reports as well as an array of research data, analytics, and advisory services. Our unbiased reports, white papers, guides, case studies, and vendor profiles provide critical information on current technology trends, strategic thinking, and market scrutiny to aid our clients in aligning resources and strategies to achieve their ultimate goals and objectives.

Already a member?

Log in to access this report. As a Tambellini member, this report is included in your subscription fee.

Become a member

Tambellini offers research, analyst, and advisory services with an exclusive focus on higher education. Regardless of organization type, size, or budget, Tambellini can tailor membership services to uniquely fit your needs. To become a member, contact Client Services or visit Our Services page.

Table of Contents

  1. Acknowledgements
  2. Terms of Use
  3. Disclaimer
  4. Executive Summary
  5. Introduction
  6. Previous Work
    1. Aegis Identity
    3. CNI
    4. Harvard University
    5. Internet2
    6. The Tambellini Group
    7. Gaps in the Previous Work
  7. Methodology for this Guide
    1. Primary Research Methodology
    2. Secondary Research Methodology
  8. Primary Research Findings by Peer Group
    1. Barriers and Enablers to IAM Adoption
      1. Barriers
      2. Enablers
    2. Importance of Compliance
    3. Staff Needed for an IAM Program
    4. Enterprise vs. Homegrown vs. Open Source Tool Adoption
    5. Yearly IAM Software Costs
    6. The Maturity Curve — Functional Gaps
      1. Basic/Foundational Gaps
      2. Enhanced Gaps
      3. Advanced Gaps
    7. The 24-Month Outlook for Cloud IAM Tool Adoption
  9. Recommendations
    1. Steps to Starting or Expanding an IAM Program
      1. People, Processes, and Technology
      2. The Role of Frameworks
  10. Conclusion
  11. References
  12. Appendices
    1. Appendix 1: Interview Questions
    2. Appendix 2: Survey Questions
  13. About the Author
  14. About The Tambellini Group
  15. Tambellini Group Research Methodology
  16. Other Reports Available