Avatier is completely energized by the 2013 Gartner IAM Summit. We concluded the event by attending a Los Angeles Kings hockey game with over 20 fellow attendees for drinks, a catered spread and unbelievable dessert bar. Our suite offered a great chance to have more in-depth conversations than experienced on a tradeshow floor and we are grateful. We hear your immediate need for identity management solutions that drive cost-savings and business enablement.
Upon reflecting on the 2020 Gartner IAM Predications, Avatier recognize that identity and access management is more important than ever as IT focuses on business agility. Avatier previously identified the megatrends driving most of the Gartner IAM 2020 Predictions at the last two conferences. Particularly, the need for a mobile and non-PC architecture with a unified risk intelligence platform, and the death of Role Based Access Control.
With our business user and business enablement focus, Avater proudly experiences alignment today with the 2020 predictions, because we began offering 2020 solutions in 2007 with the release of the world’s first user provisioning and access management IT store.
Wholeheartedly, Avatier agrees with the 2020 IAM Prediction equating the management of user accounts to consumers. We empathetically concur the way business users make requests and access systems mimics consumer behavior particularly with business enablement going BYOD mobile and business managers participating in IT governance.
Our 9.5 release of the Identity Enforcer IT store offers an expanded shopping cart experience with risk intelligence for identity management, service catalog, and request management systems. How futuristic is that?
If you missed us at the Gartner IAM conference, you can request a demonstration and see Gartner’s 2020 predictions in practice today.
Learn the role IT automation and business driven self-service administration play in creating lean operations. KuppingerCole’s Assignment Management — Think Beyond Access describes the shift in IT operations from tightly controlled identity management processes to workflow enabled administration.