Is Your New IAM Solution Delivering?

Organisations that invest in a new IAM system may wish to use the following metrics when tracking their results and ROI

After implementing new identity and access management (IAM) products, organisations would want to observe the results and changes to their system. Metrics can be an effective way for a business to measure the extent of improvement in productivity levels or financial savings. To determine if the new IAM solution has strengthened the company’s IT security, organisations should have metrics with clear key performance indicators. This also allows organisations to identify any areas of weakness as well as opportunities to streamline processes and policies. In this article, we will shed some light on how companies can track and observe their identity and access management systems through reliable and realistic metrics.

Number of IT-assisted Password Resets per Month

For retail companies that have a huge number of seasonal employees, IT helpdesk costs would be a heavy burden due to the massive number of password reset cases the IT security team would have to support. This same team could have been better utilised by focusing on critical security issues instead of handling password reset cases. With the installation of a new IAM product, password-related issues are now self-service and automated. As a result, the burden on IT security teams is drastically alleviated, and organisations should notice a drop in helpdesk expenses. Statistics have shown that password-related support costs can be reduced by as much as fifty percent, as employees can reset their forgotten passwords without relying on the IT security team. Therefore, monitoring the number of assisted password resets is a good measure of success for an IAM system.


The Number of Changes Made to User Roles per Month

Before IAM, IT security professionals have to manually amend individual user accounts within the company’s network, such as adding or removing access privileges. This creates a lot of administrative work that is time-consuming and distracts resources from more critical IT matters. With an IAM in place, these processes and policies are defined and maintained in a single place and are automated, thus decreasing the time spent on addressing user account privileges. As such, IT security teams are able to concentrate on coming up with innovative initiatives. By measuring the average system change cost before and after the implementation of IAM, organisations can determine how well the IAM solution alleviates the time and effort exhausted on these administrative processes.


For businesses in the retail sector, such a metric is especially useful as part-time employees will be given different roles and privileges as compared to full-time employees. This IAM metric will enable businesses to better monitor the efficiency of the IAM system.


The Rate of Account Provisioning and De-provisioning

The manual provisioning and de-provisioning of user accounts are very time-consuming and tedious tasks. The IT security team must first create an account for various privileges and applications, while being meticulous to make sure that every detail is correct. Only thereafter can the user access the online resources and begin to do their work. Through IAM services, businesses can shorten the timeframe between account creation and account provisioning, allowing new employees to start working as soon as they enter the organisation. By using this metric, one can observe how IAM shortens the provisioning process down to zero-day onboarding for new users.


Likewise for de-provisioning, the number of unused accounts can be swiftly dealt with, as accounts are de-provisioned the instant an employee exits the company. This also reduces the risk of an orphaned account being used to breach the organisation’s security.


The Number of Accounts with Poor Security

By installing an IAM framework with single-sign on (SSO) capabilities, companies can eliminate accounts with weak and / or outdated passwords. With strong password policies and authentication mechanisms, businesses will be protected from large-scale data breaches. This will enhance customer perception of the organisation, enabling the business to build an image as trustworthy and secure. Moreover, organisations can enhance their productivity levels without stressing over malicious attacks and security threats.



In conclusion, these metrics help businesses determine the effectiveness of their newly-installed IAM solution and better gauge their return on investment. Members of the IT security team can also utilise these metrics, to provide more business-centric figures and prove how IAM plays an unseen but crucial role in the business’ growth.