Service

KPMG - Cyber Security (IAM): Identity and Access Management

Let KPMG maintain and operate, monitor and execute end-to-end identity related services for your current IAM solution.

 

 

 

Tarun Sondhi

Tarun Sondhi

Principal, Cyber Security, KPMG US

+1 703-286-8239

Chad Veldhuizen

Chad Veldhuizen

Director, Info Protection & Business Resilience, KPMG US

+1 303-382-7027

Summary

 

KPMG understands the struggles our clients go through with an IAM implementation: They start a solution deployment and in 6-9 months it is “ready” for use.  However, this is just the beginning of enabling the business value of IAM solution.  Adopting am IAM system is one thing; integrating it with other applications, aligning it with business practices, and managing it over time is quite another.  Our outcome-based managed services focuses on three areas to enable identity-related execution and operations:

  1. Day-to-day management of the health and operations of cyber technology providers
  2. Execute business operations
  3. Expand the cyber capabilities and reach in a repeatable fashion.

 

Capabilities
 

 


Day-to-day technology operations 


Software implementation, patching, and policy development, backed by 24x7 event monitoring, analysis, and remediation from our global delivery team.

 


Business operations


Ticket management, user access reviews, process automation, and customization for privileged accounts and data.

 


Expand and enhance


Integration with other systems and applications that provide automation and real-time data feeds for greater insight and protection.

Features

 

A customized, outcome-based service 


The KPMG IAM service is a flexible, outcome-based service that is tailored to your specific needs. Instead of indefinite consulting fees based on an hourly rate, you will only pay for the results delivered. These often include a predetermined volume and combination of:

  

  • Applications on boarded
  • Patches applied
  • User access reviews completed
  • Tickets executed
  • Policies created

Case studies


A leader in IAM optimization

With more than 15 years of experience, our cyber security team is at the forefront of IAM optimization. Forrester Research has named KPMG a leader among global cyber security consulting providers, giving us the highest possible scores in the categories of business acumen, security strategy consulting, and governance, risk and compliance capabilities.




Deep application expertise

We have deep technical expertise in IAM and formal alliances with CyberArk, Okta, Oracle, Ping Identity, and SailPoint. We can help you get more out the IAM system you already have in place, or help you design, customize, implement, and integrate an entirely new IAM solution.

Let's Talk

What business issues are you looking to solve? Talk to a KPMG team member to put our on demand services to work for you.

 I agree to the KPMG Privacy Policy. *