If you have been following our journey at IndyKite you are familiar with our drive to look at the complexities surrounding the modern, digital landscape and find real-world solutions that the industry hasn’t even begun to think about.
It is not for a lack of interest that the industry hasn’t shifted its attention into the utility of identity data. Nearly every customer we speak to has an interest in ROI from their existing identity and access management solutions. Rather, the challenges that most organizations face are more practical in nature. Identity is the number one attack vector for businesses so it makes sense that companies would be focused on securing themselves as well as providing a safe experience for their customers. Additionally, many organizations view identity as a support function, not a business driver, which separates them organizationally.
It is clear, different industries and businesses have different ways of operating. One thing most share, however, is an underlying data structure that does not allow them to move beyond their current ways of working. Even if they did have the ambition to repurpose identity data, they are limited in the ways they can use it across many areas of the business, and at scale.
From identity data to knowledge
In order to make the shift from current ways of operating into a place that can position identity as a business driver, we require flexible data models. You can check out our other blogs here on the value of graph for identity management. We love graph because it gives us the means to turn identity data into identity knowledge, and with identity knowledge the possibilities for ROI are compounded at your organization.
When we look at identity from the perspective of relationships between things and humans instead of their individual attributes, we uncover the insights needed for complex, dynamic authorization use cases and beyond.
The result of putting identity knowledge to work is that you can use it as a centerpiece to connect your services in the organization, including things like cyber, risk, fraud, marketing and new product creation.
The interesting question is how can we pull identity through the entire business for what we call ‘utility’. We want to challenge the industry to ask itself - how can you move beyond current state identity management and turn it into a business asset?