Technology, Evaluation and Selection

The organization was growing rapidly through acquisitions across the country but the IAM program wasn’t nimble or effective at handling the growing needs.

Evaluating and selecting technology solution(s) for a IAM program with true independence


A major healthcare system with over a hundred hospitals and hundreds of ambulatory facilities across the country had a problem with their Identity and Access Management (IAM) program. The program found itself needing to address three specific challenges urgently. For one, their existing IAM investments were not performing in meeting stakeholder expectations or yielding any meaningful returns. Despite considerable technology and consulting expenditure, they had not made meaningful progress in solving the day-to-day operational IAM problems. Second, the organization was growing rapidly through acquisitions across the country but the IAM program wasn’t nimble or effective at handling the growing needs. Third, the IAM program had inadequate vision, strategy or plans to support the current and emerging dynamic and competitive business as well as regulatory risk management era in healthcare. The client selected Tueoris to evaluate and select suitable commercial technology solutions to help establish stronger capabilities across a variety of IAM areas – including Identity and Access Governance (IAG), advanced authentication for “enabling” clinical workflows and risk based strong (adaptive) authentication of remote as well as internal access.

What We did

Our work with the client included the following specific tasks:
  • Review the current gaps and issues in IAM operational capabilities and propose certain quick-win changes to people, process and technology aspects of the IAM program.
  • Develop architecture, strategies and five year program roadmaps for the three IAM areas in close collaboration with the organization’s Business, IT and Clinical leadership as well as leaders of specific verticals within security (e.g. SIEM, DLP. Risk management and compliance).
  • Lead three separate product vendor selection efforts for the three IAM areas based on the developed strategy and roadmaps criteria. This included preparation of detailed RFI, assessment of the RFI responses and consultation with Research Analysts (Gartner and Forrester) regarding their opinion on the vendors relative to the client requirements.
  • Shortlisted the vendors further to two vendors for week-long (for each vendor) on-site proof-of-concept (POC).
  • Developed detailed use cases covering specific client requirements. The detailed use-cases included not just the traditional IAM use cases but also use-cases pertaining to facilitation of clinical workflows, use of mobile devices, security risk management, regulatory compliance and integration with other security verticals such as DLP, SIEM, safeguards for unstructured data etc. The number of detailed use-cases ran into a hundred or more for the vendor PsOC.
  • Organized and conducted the vendors PsOC efforts involving appropriate clinical, business and IT stakeholders.
  • Upon completion of the PsOC, we provided the client sponsor with the detailed evaluation of the vendors’ performance at the PsOC as well as the vendor ranking in other areas such as vendor viability/capacity, suitability of the vendor relative to the client culture or other organizational aspects, vendor performance at clients (based on reference calls) etc.
  • Provided the implementation teams with the appropriate guidelines and handover for implementation of the selected vendor solutions.

Why Tueoris

IAM strategy development efforts have traditionally performed by IAM specialists who have risen up the IAM ranks (as it were) by implementing specific technologies. It is often the case that these IAM specialists do not have nearly the insights or experience in the larger security and privacy areas needed to formulate sound and sustainable strategies for today’s IAM programs. It is also important to note that not all IAM problems need or can have a technology solution. Even if some problems are best solved using a technology solution, traditional IAM technologies may not be the best fit in some cases. For instance, security or privacy incident detection and response solutions could supplement or help meet specific needs of a IAM program but IAM specialists often do not have the insights or experience outside of the traditional IAM technology space. At Tueoris, we have the breadth and depth in our insights and experience required to formulate solutions for today’s IAM problems. Also, since we do not partner with any specific IAM vendors, we are able to maintain true Independence in in evaluating and selecting vendors based on a sound IAM strategy.