Gathid announced the debut of its new approach to identity and access governance. Inspired by the power of gathered identities, the platform pinpoints identity and access anomalies with its patented directed graph model. Designed for rapid deployment, immediate applicability, and smooth integration across complex IT infrastructures, this solution tackles the critical need for scalable and cost-effective identity management.

Identity and access management (IAM) solutions require centralized approaches. This results in reliance on a single or small handful of vendors to facilitate large-scale continuous deployments that maintain real-time identity concurrency between all systems. These large-scale deployments come at a high cost to purchase, migrate, and enable. Building on 20 years of dedicated experience solving complex physical security challenges for some of the largest companies in the world, Peter Hill, founder and CEO of Gathid, and his team identified a need for a solution that seamlessly integrates with existing infrastructure to help organizations tackle today?s increasingly complex identity security challenges.

In fourth quarter 2023, Gathid successfully transitioned from physical security to identity governance to address this gap. This strategic move leverages Gathid?s international scale to address the growing need for robust identity and access management. Gathid?s strength lies in its novel application of a patented directed graph model for identity and access improvements.

It offers a fast-to-deploy, resource-efficient approach that can function across disconnected systems in hybrid and multi-cloud environments. This dynamic patented identity model, known as the ?Gathid Graph," is automatically reconstructed daily from the ground up, liberating organizations from the constraints of system syncs and incomplete delta reports. If automation misses a beat, Gathid highlights what?s amiss, directing users' focus to critical compliance clean-up areas.

This ongoing daily refresh cycle is crucial in maintaining an ever-accurate, ever-compliant identity and access ecosystem. Key benefits include: Identity graph technology: Gathid?s patented approach constructs a daily identity graph model, enabling the representation of virtual data relationships between identities and access rights to systems. This provides a comprehensive and holistic view of the entire enterprise identity landscape. Rapid deployment: Gathid offers a streamlined, easy-to-deploy solution that receives and models identity data from any systems and assets, without requiring complex bi-directional integrations.

Typically excluded complex and/or disconnected applications, such as legacy, on-premise, shadow IT, operational technology (OT), and physical access control systems (PACS), can now also be analyzed from day one without requiring write access to the source system or complex bi-directional integration. Gathid delivers immediate return on investment (ROI) by connecting inter-system data gaps, providing immediate cross-functional insights, unlike traditional approaches requiring bi-directional integrations to be designed, built, and tested, which can take months or years to design and implement. Affordable insight for every system: Gathid bridges the visibility gap in identity and access governance, offering immediate insight into business roles and the identities and access connected to them.

Wherever role-based access control (RBAC) journey, the Gathid Graph enables to identify and track changes in roles, identities, and access without the high costs of traditional approaches, which often include manual processes, stale data analysis, and large consulting projects. Continuous Automated User Access Reviews (UAR): With Gathid, can automate and streamline user access reviews, ensuring that permissions are always up to date. Toxic role combination alerts: Gathid?s advanced algorithms can analyze high-risk identity and segregation of duties (SoD) access data, not only within systems, but also across diverse technologies and monitor potentially toxic access privileges that violate security and compliance policies across applications and assets.

This allows organizations to identify and rectify toxic role combinations, ensuring a dynamic, meaningful, and secure identity and access program. Incident memory: Gathid empowers incident response with a historical daily record of identities and access, allowing a comparative review of access rights changes before, during, and after an incident. It can also notify when potential access risk has been determined and provide recommendations for mitigating and preventing future incidents.

Compatibility: The Gathid platform is completely independent of existing enterprise applications and can receive identity and access data from any systems and assets, either manually or automatically. The Gathid Graph does not attempt to maintain concurrency of its identity model; it simply receives daily snapshots and rebuilds the identity and access model, archiving the previous model when a new model is created from fresh data.