AKA Identity: Digging into the data defining AIM

AKA Identity logo Intellyx BrainCandyAn Intellyx Brain Candy Brief

There’s a lot more data involved with identity than simple user/password combos, roles, and access privileges, especially in today’s distributed, cloudy computing landscape.

AKA Identity is seeking to get ahead of the waves of data splashing across access and identity management (AIM) solutions by observing user and system access activity, then automating privilege and policy adjustments or routing significant data anomalies to security or service management teams for resolution.

Modern applications encompass too many user-to-system sessions and system-to-system activities for a human to adequately process. Role-based and attribute-based access and microsegmentation policies only multiply the complexity and volume of AIM data, so visibility into this data at a global and domain level is an area of particular interest to today’s architects.

The well-backed startup is currently optimizing identity data pipelines for a limited set of enterprise customers.

Copyright ©2023 Intellyx LLC. Intellyx is an industry analysis and advisory firm focused on enterprise digital transformation. Covering every angle of enterprise IT from mainframes to artificial intelligence, our broad focus across technologies allows business executives and IT professionals to connect the dots among disruptive trends. At the time of writing, AKA Identity is not an Intellyx customer. No AI was used to write this article. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS:

Principal Analyst & CMO, Intellyx. Twitter: @bluefug