I write so frequently about specific issues, features and products related to identity and access risk management, I sometimes lose the forest through the trees. It’s important to step back and think through periodically exactly what IT teams are attempting to accomplish when they deploy these solutions.