Skip to content Skip to footer

Loading Results

Digital Identity

Identity and access management (IAM) is the (security) discipline that enables the right individuals to access to the right resources at the right times, in the right way for the right reasons and being able to report on that access. It comprises solutions involving people, process as well as technology

The need to ensure appropriate access to resources across increasingly complex technology environments is paramount to ensuring a secure environment, in addition to meeting increasingly rigorous compliance requirements.

The need to empower end-users with control over their data in an intuitive and secure way, while protecting their privacy is one of the core challenges in the coming years.

Service type: Service areas: Key capabilities:




  • Capability assessment
  • Benchmarking
  • Org structure, processes, and technology evaluation
Strategy and roadmap
  • Future state definition
  • Gap analysis 
  • Business case development
  • Economics and financial modeling
  • Steering committee
  • Strategy and architecture
  • Risk and compliance management
  • Business change enablement
  • Business case & stakeholder management
  • Balanced scorecard
  • Portfolio management
  • Benefits management

Access management

  • (Biometric)
  • Authentication
  • Authorization
  • 2FA and multi-factor
  • Web access management
  • SSO
  • Policy management and enforcement
  • Privileged access management
  • Remote access

Identity governance and administration

  • Identity lifecycle management
  • Directory services
  • Entitlement administration
  • Role and policy management
  • Access requests
  • Access fulfillment (provisioning)
  • Access certification
  Federated IAM
  • Identity correlation
  • Identity synchronization
  • Identity provider (IdP)
  • Identity as a Service (IDaaS)
  • Externalized authorization management (EAM)
  Identity analytics and intelligence
  • Log aggregation
  • Reporting engine
  • Business metrics (KPIs)
  • Risk management
  • Compliance proof
  • Process effectiveness
  • Decision support
  • Behavioral analytics
  Vendor identification
  • Proof of concept
  • Vendor analysis
  Technology management
  • Design, build, test, and operate (cloud and on-premises)
  • Technology enhancement

Managed IAM 

  • Level 1, 2 and / or 3 support
  • Strategic operations (continuous improvement)

Contact us

Jock  Nunan

Jock Nunan

Country Managing Partner, Assurance Services Leader

Ilian Stoianov

Ilian Stoianov

Director, Risk Assurance

Tel: +359 895 558 319

Follow us