<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/audiopodcast/tag/iga"/>
        <atom:link rel="next" href="https://videos.elimity.com/audiopodcast/tag/iga?tag=iga&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/audio/podcast/102142572-14-audio.mp3" type="audio/mp3" length="1006065"/>
            <title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</title>
            <link>http://videos.elimity.com/idata-driven-iam-identity</link>
            <description>&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142572</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</media:title>
            <itunes:summary>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.
And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</itunes:summary>
            <itunes:subtitle>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:24</itunes:duration>
            <media:description type="html">&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f52db3930a592edce2689be8c554683&amp;source=podcast&amp;photo%5fid=102142572" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category> CMMC etc.   However</category>
            <category>Data-Driven IAM</category>
            <category> especially with regulations such as NIS2</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
            <category> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</category>
            <category> ISO27001</category>
            <category> IT and other technologies</category>
            <category> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</category>
            <category> siloed information: these identities are spread across many individual environments</category>
            <category> SOC2</category>
            <category>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/audio/podcast/102142570-13-audio.mp3" type="audio/mp3" length="609840"/>
            <title>[Data-Driven IAM] Merger and Acquisition</title>
            <link>http://videos.elimity.com/data-driven-iam-merger-and</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142570</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Merger and Acquisition</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:51</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=7a2664fd113d59b21679b2dfd3d687b9&amp;source=podcast&amp;photo%5fid=102142570" width="625" height="352" type="text/html" medium="video" duration="51" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/audio/podcast/91299554-13-audio.mp3" type="audio/mp3" length="1338035"/>
            <title>[Customer Case] Pharma Company Needs IAM Visibility</title>
            <link>http://videos.elimity.com/customer-case-pharma-company-needs</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-pharma-company-needs"&gt;&lt;img src="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299554</guid>
            <pubDate>Mon, 04 Dec 2023 12:32:36 GMT</pubDate>
            <media:title>[Customer Case] Pharma Company Needs IAM Visibility</media:title>
            <itunes:summary>Customer Profile &#128064;Global BioPharma CompanyActive in 40 countries worldwideAbout 10k usersBig SAP LandscapeIGA in place for 5+ yearsChallengesA global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. </itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Global BioPharma CompanyActive in 40 countries worldwideAbout 10k usersBig SAP LandscapeIGA in place for 5+ yearsChallengesA global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-pharma-company-needs"&gt;&lt;img src="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=2e08692333732c09eb883a0a9e2a8898&amp;source=podcast&amp;photo%5fid=91299554" width="625" height="352" type="text/html" medium="video" duration="111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/audio/podcast/91299556-32-audio.mp3" type="audio/mp3" length="901059"/>
            <title>[Customer Case] Retail Has Complex IAM Landscape</title>
            <link>http://videos.elimity.com/customer-case-retail-has-complex</link>
            <description>&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-retail-has-complex"&gt;&lt;img src="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299556</guid>
            <pubDate>Mon, 04 Dec 2023 12:28:26 GMT</pubDate>
            <media:title>[Customer Case] Retail Has Complex IAM Landscape</media:title>
            <itunes:summary>Customer Profile &#128064;Multinational Retail CompanyActive WorldwideAbout 400k UsersExtremely Complex IAM landscape with multiple HR systems, domains, directories and IGAsChallengesA multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.</itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Multinational Retail CompanyActive WorldwideAbout 400k UsersExtremely Complex IAM landscape with multiple HR systems, domains, directories and IGAsChallengesA multinational retail company has multiple identity systems which have...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:15</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-retail-has-complex"&gt;&lt;img src="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c471ebf3f4a1fa8ce8d45f35c3cea52a&amp;source=podcast&amp;photo%5fid=91299556" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/audio/podcast/91299546-44-audio.mp3" type="audio/mp3" length="2052118"/>
            <title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</title>
            <link>http://videos.elimity.com/customer-case-fortune-500-bank</link>
            <description>&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-fortune-500-bank"&gt;&lt;img src="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299546</guid>
            <pubDate>Mon, 04 Dec 2023 12:19:15 GMT</pubDate>
            <media:title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</media:title>
            <itunes:summary>Customer Profile &#128064;Fortune-500 bankAbout 35k EmployeesHighly Mature IGA Deployment (+5 Years)ANDEuropean BankAbout 6k EmployeesHighly Mature IGA Deployment (5+ Years)ChallengesA multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.System owners: who can access my application?IAM expert: what should I put in a role for team X?Security experts: orphaned accounts?The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.</itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Fortune-500 bankAbout 35k EmployeesHighly Mature IGA Deployment (+5 Years)ANDEuropean BankAbout 6k EmployeesHighly Mature IGA Deployment (5+ Years)ChallengesA multinational retail company has multiple identity systems which have...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-fortune-500-bank"&gt;&lt;img src="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=0598ccd6279e364a1ed33a2c5ae7f384&amp;source=podcast&amp;photo%5fid=91299546" width="625" height="352" type="text/html" medium="video" duration="171" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
    </channel>
</rss>
