What’s Driving Identity Programs Today?

Identity programs are primarily driven by challenges in three areas: compliance, operational efficiency and user productivity. Building a business case for identity security involves demonstrating how identity can effectively address these challenges and then justifying the cost based on the expected business benefits. Improving security can also be an important program driver and should be included in any identity business case, but the financial benefits of such a program, while clearly reducing risk, tend to be more difficult to quantify. The following section describes some of the typical challenges that drive organizations to pursue identity programs.

Meeting Audit and Compliance Requirements

Organizations continue to work toward improving their overall compliance with regulations that govern data privacy and security – while concurrently controlling the cost of that compliance. This becomes increasingly challenging as the number of regulations increases, the amount of data to be maintained grows and operations become more complex in light of emerging trends such as today’s hybrid, work from anywhere, Zero Trust, BYOD, digitally transformed realities. Identity security programs are designed to deliver end-to-end visibility and automate controls across an organization’s systems and applications. They make it easier and more cost-efficient to establish a desired-state model for compliance, enforce conformance to the model and attest to the effectiveness of internal controls. Ongoing access certifications become both more effective and less resource intensive through the strategic use of automated identity controls such as policy enforcement and role-based access models.

There were over 22 billion records released from data breaches in 2021.1

Lowering IT and Helpdesk Operating Costs

Many organizations are still using fragmented, manual processes for adding, changing and removing user access privileges. The result is inefficient, error-prone and costly execution of access requests, password resets and other access changes and a heavy burden on IT and helpdesk staff. By automating these processes, organizations can reduce the number of requests from business users, the number of approvals required to grant access and the number of calls to the help desk.

Streamlining Delivery of Access to the Business

Given the fast-paced and dynamic environment of business today, IT organizations are challenged to keep up with the demand for identity services, and to do so in a compliant manner. Business users cannot wait days or weeks for access to systems required to perform their job duties. The right identity security solution, with Artificial Intelligence (AI) and machine learning at the core, can streamline the delivery of user access and significantly reduce the time to implement access changes, while continuously enforcing governance rules and compliance policies. It can also empower business users to become active participants in identity processes, enabling them to manage their own access and passwords.

Ensuring Security and Reducing Risk

Security risks are a fact of life for every organization, which must put controls in place to protect against both internal and external threats. Unfortunately, security is an issue that only seems to be getting worse. According to a report from Risk Based Security, 2021 saw 4,145 data breaches that exposed over 22 billion records. Implementing an identity security solution that can spot risky users and access outliers can play a significant role in strengthening security by helping your organization detect and remediate vulnerabilities: users with excess or inappropriate access privileges, terminated workers who still have access privileges, policy violations such as separation-of-duty (SoD), and poorly-managed privileged user accounts.

A Stepwise Approach to Building Your Case

At a time when IT budgets remain tight, a carefully constructed business case is essential to unlocking funding for identity programs. The following four-part process will help justify spending based on the value of the program to the business.

Assess Needs

  • What problem(s) will the program solve?
  • Which areas are most urgent?
  • How will it deliver value to the organization?

Establish Baselines

  • What are our identity compliance costs?
  • What are our identity helpdesk costs?
  • How long does it take new users to be
  • provisioned?
  • Where are the bottlenecks?
  • Where are our audit deficiencies?

Set Goals

  • What improvements will result?
  • Time savings?
  • Labor savings?
  • Reduction in risk?

Create the Financial Model

  • How much money and time will the program save?
  • How much will the program cost to purchase, implement and support?
  • What is the net result?

Step 1: Assess Needs

The business case for any proposed identity program always starts with one fundamental question: Why is it needed? Or, more specifically, what business problems do you intend to solve with identity security, and how will it ultimately deliver value to the organization? The first step in building the business case is, therefore, assessing internal needs to identify and prioritize challenges that are likely to drive the most value. Thinking back to the preceding section of this paper, consider the challenges described in compliance, IT operations, user productivity and security. What challenges within these areas does the organization face? Which are the most pressing? Which are most likely to move the business forward or, if not addressed, open the business up to more risk? It’s important to be extremely specific about the challenge or area to be addressed.

Here are some questions you may ask while assessing the needs of your organization:

  • Compliance: How much does compliance cost your organization today? How effective is your compliance program? Was there an audit failure? What specific controls did the auditors fail? Did they include any comments or recommendations that would be useful to you in preventing future problems?
  • IT Operations: Is the helpdesk inundated with service requests? Can you document exactly what issues are causing the overload? Is it requests for access changes or password resets?
  • User Productivity: Are new users sitting idle waiting for the access they need to become productive? Do employees waste time navigating disparate login processes for a variety of applications? Are users locked out of systems while they wait for the helpdesk to assist them?
  • Security: Is the organization’s board of directors asking you to step up security? Is the problem a fear of external threats based on multi-channel media reports? Are there indications of a real risk of insider threats, such as a large population of super users or orphan accounts? Do you have overprivileged users?

The general drivers for action are well-recognized – compliance mandates, cost reduction, business enablement, risk avoidance, improving efficiencies – but identifying the things that are specific to your organization is essential to laying the foundation for a strong business case. The rest of the steps in the process all build on the needs assessment that’s conducted at the very beginning.

Step 2: Establish Baselines

Establishing a baseline requires you to analyze what’s working and what’s not in your current environment. For example, if there is an issue in access delivery, what are the identity processes currently being used? How do users request access? Is there a form they fill out and submit to the helpdesk? Does the helpdesk take over the process from there? How? Creating a map that thoroughly documents all the parts of the process – identifying which parts are done manually, which are automated, how long they take and so on – will ultimately make it possible to understand how the work gets done and the associated costs.

Understanding who participates in the process is critical to setting a useful baseline. It’s easy to underestimate the number of people who are affected by a process and it’s also easy to fail to see how they are affected. It’s important to identify all key participants – from the IT operations team to helpdesk staff, to business users – and to understand the role they play and how they view their part in the process. Documenting their perceptions and issues is important because their collective view can play a key part in getting funding for a program.

Once your current processes and participants are documented, that information can be used to determine the cost of the current approach. And while hard costs will likely have the greatest effect on the financial model, soft costs may resonate even more strongly with a business audience. The pain and frustration they experience from failed processes may be difficult to quantify in financial terms, but it can help present a strong business case to participants who are in a position to influence funding.

The baseline works almost like the “current location” function of a GPS. To map out a path to your goal, you must have a starting point.

In that sense, the next two steps build on the first two, because they’re based on understanding the current situation: current capabilities, processes, participants and costs. Only with that understanding is it possible to set goals for your identity program going forward.

Step 3: Set Goals

Persuasive business cases are built by outlining a path to achieve real business goals. That may sound like an obvious point, but it can be easy to get bogged down in technical terms and lose sight of the business benefits that are likely to motivate decision makers to fund a program. The people who make funding decisions are generally business-oriented rather than technology-driven. They want to hear about the specific goals and measurable objectives in terms of what they mean to business users and business processes, as well as their impact on the overall risk posture of the organization.

So, while the selection of a particular technology solution may come down to its architecture or another technical aspect, decisions at the business-case level are made based on what kind of solution the organization is acquiring, how much it’s going to cost and what its ultimate business value will be.

A second point to remember in setting goals is that they must be clearly measurable. If, for example, you’ve projected that you’re going to save the business $10 million over the next five years, you have to be able to show how you’re going to attach specific measurements related to that goal. Similarly, if you’ve projected that you’re going to reduce helpdesk calls for access requests or password resets, you must be able to show how you’re going to measure the reduction. If you can’t measure it because you don’t have visibility to the relevant information, it’s best not to include the goal in the business case.

The final point for goal-setting is to be realistic, which can mean starting small and showing incremental value over time. This allows the team to establish credibility by not overstating the expected benefits. For example, a program can be broken down into multiple phases, rather than be undertaken all at once. Successes in the first phase can be used to document and validate the assumptions that drove the program to begin with, establishing that the projected benefits are indeed realistic and attainable. This can help unlock funding for future phases – potentially in far greater amounts than might have otherwise been initially available.

Automation using AI and machine learning is a valuable tool for making provisioning processes more efficient and accurate while at the same time lowering costs – but automating every system and every process across an organization can require a great deal of time. Start small and build upon early success.

Step 4: Create the Financial Model

Calculating business value involves the process of weighing the benefits of a program against its costs. Estimating costs is a matter of thinking through how the program will unfold and what costs will be associated with every aspect of it. Will you be acquiring software? Hardware? Both? Will you require implementation services to deploy the program, or will you handle it in-house? If it’s the latter, will you have to add staff? What sort of ongoing support or maintenance will be needed for the program? Again, will you need an external service provider for this, or can it be handled internally with existing staff?

Your next step is to quantify the program’s benefits. You will need to document the specific improvements and how you will save the organization money with a new identity security solution. How much will you save by reducing compliance costs? How much will you save by reducing helpdesk incidents? How much time will you save users waiting for access?

Here are some common metrics you should consider in quantifying the financial benefits of your program:


  • Reduced time to compile access certification reports 
  • Reduced time to review and complete access certifications 
  • Reduced time to detect and remediate access policy violations 
  • Reduced time to compile audit reports

IT Operational Efficiency

  • Reduced number of helpdesk incidents relating to access requests/changes
  • Reduced number of helpdesk incidents relating to passwords
  • Quicker helpdesk resolution timesFewer helpdesk escalations
  • Reduced number of access changes performed by application administrators
  • Time saved by automatically creating common access roles

User Productivity

  • Quicker new hire provisioning
  • Quicker ad hoc access changes and provisioning
  • Quicker approval times on change requests
  • Quicker resolution of password incidents (forgotten passwords, resets)

Reducing Security Vulnerabilities

  • Expanded access certification coverage more applications/users
  • Quicker deprovisioning of terminated workers
  • Orphan accounts detected and removed
  • Access outliers identified and remediated
  • Separation of duties (SoD) policies enforced
  • Higher number of excess privileges revoked
  • Higher number of service accounts and duplicate accounts revoked
  • Expanded number of applications with enforced password policy
  • Expanded number of applications with multi-factor authentication

Once you understand the costs and benefits associated with a program, there’s more than one way to measure its value. Every organization has its own preferred financial metrics. It may be based on the payback period, i.e., how quickly the investment in the program can be paid back in terms of months or years. It may be based on the return on investment (ROI), i.e., how quickly it can be paid back in terms of the value of the time and resources invested. The key is to align the financial model with the benchmarks that management expects to see. Payback period and ROI are typical metrics used by many organizations and are both easy calculations to include as a part of your financial model.

Once you’ve documented the specific metrics, you can begin to actually build out the individual components of the financial model, both on the cost side and on the value side.

SailPoint Can Help

SailPoint is the leading provider of identity security for the modern enterprise. At the core of SailPoint Identity Security is artificial intelligence and machine learning. A foundation that protects organizations by automating the discovery, management, and control of ALL user access. SailPoint ensures that each identity, human or non-human, has the right access needed to do their job – no more, no less – and that access is automatically adjusted as their role changes or if they leave the organization. It can also spot risky user behaviors, detecting and preventing toxic access combinations that could lead to potential fraud or data theft.

Adapt and Ensure the Security of Every Identity

SailPoint enables a 360-degree view across all identities and their access, leveraging AI and Machine Learning to detect and address access anomalies and reduce access risk. Our unmatched intelligence sees all your identities and the access they have at speed and scale. It can see what’s necessary, what’s normal and what’s not. It does the thinking for you with insights you cannot generate on your own and accelerates delivery of access to users.

Automate Identity Processes to Discover, Manage, and Secure Access

SailPoint simplifies the administration of identity security programs with automated, AI driven workflows to better manage and secure timely access to business resources, including automating identity decisions like access requests, role modeling, and access certifications, freeing up workers to focus on innovation, collaboration and productivity.

Manage and Control Access to Data, Applications, Systems, and More

SailPoint seamlessly integrates with existing business and security systems to infuse identity context and decisions into the everyday workflow of the business while creating a frictionless, user-centric experience that makes your organization more connected and protected. Integration with hundreds of connectors allows you to manage identity access across your entire hybrid IT environment.

Meet Compliance Demands and Improve Audit Performance

SailPoint automates the common auditing, reporting and management activities associated with a strong compliance program and integrates identity processes such as access certification and policy enforcement to deliver the strong detective controls that auditors demand.

Reduce IT Burden

SailPoint seamlessly integrates with existing business and security systems to infuse identity context and decisions into the everyday workflow of the business while creating a frictionless, user-centric experience that makes your organization more connected and protected. Integration with hundreds of connectors allows you to manage identity access across your entire hybrid IT environment.

Real-world Successes

SailPoint has helped hundreds of customers worldwide achieve quantifiable benefits in compliance, operational efficiency, user productivity and security. Here are some recent examples:

Security: Eliminating excess entitlements and minimizing risk

One of the most common results organizations see after using SailPoint to automate access certifications is a dramatic reduction in the number of excess access entitlements held by users. One international bank reported a 50% reduction in total entitlements after the first cycle of automated certifications with SailPoint. While 20 to 40% reductions are typical, up to 60% has been documented.

Compliance: Reducing resource requirements

A global insurance company saved the equivalent of 50 full-time employees annually in controls testing and documentation alone. The company accomplished this by using SailPoint to automate access certifications and access policy enforcement, and by reducing the number of auditors required to test the controls and document the processes.

Provisioning: Reducing IT operations costs

By using SailPoint to automate self-service access requests across the enterprise, a large process manufacturer was able to reduce IT operations costs by $1,000,000 in one year.

Compliance: Increasing efficiency in access reviews

By automating access certifications with SailPoint, a multi-national wealth management business slashed the time it took to review and certify users’ access from one year to one month.

Access Request and Provisioning: Improving user productivity

A multi-national financial services provider switched from their legacy identity solution to SailPoint Identity Security. Previously, provisioning a new class of 50 users would have taken 14 hours. The team can now do that in 2.5 minutes.

Password Management: Eliminating costly IT helpdesk calls 

A global apparel and footwear manufacturer was able to replace an outdated password management solution and reduced IT helpdesk calls by 60%.

Security: Reducing organization risk

By modernizing their identity security program with SailPoint, a healthcare company ensured that access was automatically deprovisioned when workers left the organization, significantly reducing risk. This process previously took 30+ days.

Find out how SailPoint can help your organization.

*required field