Providing the right people with the 
right access at the right time is critical in any organizational 
environment, irrespective of its size. In this age of explosive growth 
in network communications, increasing collaboration and policies like 
BYOD it is challenging for enterprises to determine who all have access 
to what resources and what they are doing with their access. A 
comprehensive governance control is essential to reduce the risks 
relating to unauthorized access, mishandling of sensitive data which can
 take a toll on the reputation of the organization. It is also critical 
to comply with governance regulations that mandate access controls.
Traditional IAM (Identity and Access Management)
 is focused on access management, provisioning and de-provisioning 
related compliance. Enterprise still struggled to meet compliance, since
 this is not an all-inclusive solution. It focusses more on automation 
of the user life cycle. Traditional IAM implementations are IT driven 
rather than business driven. Provisioning driven approach rarely achieve
 expected business value. Traditional IAM is not involved in user access
 review or periodic user access certification. The classic example is a 
user requested and granted accesses for a critical application for a 
temporary time period, in this aspect zero visibility on unwanted access
 and its usage. Governance driven IAG gives you real-time visibility 
into access changes.
Historically, IAM
 systems are used in IT organizations for managing the life cycle of 
user accounts in multiple systems. These systems are connected to user 
directories to get the user for their authentication and basic profiles 
such as name, title, department etc. With this information, IAM can tell
 who the user is, but it cannot give you information about a user’s 
entitlements- which is key to an application as it will decide what each
 user can do with application and data. The challenge with provisioning 
driven approach is – for e.g if a user request and get access for an 
access for a CRM application. If the access is controlled using a group 
or entitlement, traditional IAM will provision the user to entitlement, 
but it doesn’t provide the visibility to what the user exactly can do in
 CRM using this entitlement.
IAG (Identity and Access Governance)
 systems help business people to determine what a user can do within an 
application. It collects information about user identities, entitlements
 and roles from all applications. In addition, IAG will provide more 
visibility of an entitlement in applications and it will present 
information about each entitlement in a business context rather than 
technical context. This will help business managers to understand the 
entitlements that the users request for and this will enhance the 
compliance to applications.
Governance driven IAG is more 
concentrated on a risk driven approach. Also it is more focused on 
entitlement management and this can provide a more granular level of 
visibility of user access. This approach will enable periodic user 
access review and certification of user access. Governance driven IAG 
focusses more on the fast integration of applications across multiple 
platforms and provide more visibility of user access. This model ensures
 appropriate access for all users and ,\ automate user access review 
process and also simplifies the provisioning and de-provisioning 
problem.
In today’s complex IT landscape where 
solutions are dependent on multiple heterogeneous platforms and 
enterprise applications extend their presence into mobile and cloud 
space, tighter regulatory controls are required to protect the 
enterprise data from unauthorized access. Governance driven Identity and Access management allow organizations to review, audit and enforce policies for fine-grained access privileges
 across the IT environment. It can also bring in end-to-end visibility 
and control across all critical systems and applications – a breadth of 
coverage that is more efficient and reliable than traditional IAM solutions.










