Efficient identification administration is essential to enterprise safety, enablement, and — finally — success. However regardless of its significance, enterprise leaders outdoors the IT and safety house usually have solely a surface-level understanding of identification safety.
It is a complicated subject, and establishing a agency grasp on the nuances of entry, governance, entitlements, and permissions will be troublesome and complicated. Much more difficult is knowing learn how to defend on-premises options, cloud environments, and multitenant software-as-a-service (SaaS) instruments. Third-party threat administration (TPRM) is vital, and vetting potential new distributors — particularly safety distributors — requires figuring out what inquiries to ask and what crimson flags to search for.
Why Consider Distributors and Suppliers?
Most vendor evaluations deal with the provider’s technical and purposeful prowess. Whereas these are vital concerns, they can’t be the lone decision-making standards for a profitable long-term partnership and consequence. It is vital to comprehensively consider a vendor past its technical capabilities alone.
For instance, long-term viability is crucial for safety distributors. An efficient identification safety answer have to be built-in throughout all environments and defend tens (if not a whole lot) of hundreds of identities. You might want to know whether or not the corporate will nonetheless be round in two years — or 5, or ten. Switching safety suppliers is difficult, which implies selecting a financially steady and viable associate is a critical consideration.
It is also vital to have a look at the corporate’s historical past of technical innovation — not solely at what it’s doing now. An organization might need know-how that appears intriguing now, however does it have a historical past of adapting rapidly to new traits, or does it recurrently lag behind?
Maybe most important, what’s the provider’s stage of threat? Has it been breached just lately? In that case, how did it reply? No chief info safety officer (CISO) or chief info officer (CIO) desires to be held answerable for a breach that prices thousands and thousands of {dollars} and damages the model.
Inquiries to Ask Potential Distributors
Earlier than you do enterprise with a brand new vendor, you want to ask inquiries to assess the non-technical capabilities that might influence your organization’s threat.
First, assess the seller’s monetary well being. This might imply asking for audited financials and reviewing the corporate’s funding and possession mannequin. A poorly structured firm could be a critical crimson flag. This course of can even assist gauge the corporate’s priorities; for instance, what share of staff are in forward-thinking areas like R&D or options structure? It is also a good suggestion to get a way of the enterprise tradition, as a disgruntled worker with entry to a privileged identification has the potential to trigger vital injury. You additionally wish to take a look at its service stage agreements (SLAs) and contracts to get a way of the way it operates and interacts with purchasers.
Subsequent, take into account its current (and previous) clients and whether or not they can present constructive references. Statistics like Web Promoter Rating (NPS) and Buyer Satisfaction Rating (CSAT) can reveal how purchasers really feel in regards to the firm’s service, and its buyer retention price will let you know how lengthy they have an inclination to stay round. Ask why firms have a tendency to go away. Poor service and safety issues are crimson flags.
All these items issue right into a vendor’s well being and safety, nevertheless it’s additionally vital to look immediately at its safety and compliance standing. Ask for its safety certifications and knowledge residency — does it primarily use on-premises or cloud options? What number of cloud options? The place does it get safety help? In-house or from a 3rd social gathering? How does it align with knowledge privateness laws such because the Basic Knowledge Safety Regulation (GDPR) and California Privateness Rights Act (CPRA)? Is it SOC 2 compliant or ISO 27001 licensed? These solutions will not essentially provide the full image, however they’ll present a invaluable glimpse into how the seller approaches safety — and the way possible it’s that your identification safety may very well be compromised.
The Identify of the Sport Is Limiting Threat
With third-party assaults persevering with to rise, at the moment’s companies must be positive they’re limiting third-party threat from the second they start contemplating new distributors and companions.
An insufficient safety program provides as much as numerous potential threat in your firm. Organizations bringing on new safety distributors have to be ruthless of their evaluations. Guaranteeing new distributors are in good monetary standing, foster a robust firm tradition, and have a considerate and cautious method to safety is likely one of the most vital methods to restrict the chance your online business is uncovered to. Nobody desires to be on the hook for a breach that prices their firm thousands and thousands of {dollars} (and the ensuing reputational injury) as a result of they settled for a vendor that was “ok.” Selecting the correct associate is an important ingredient of a profitable identification safety program.
Concerning the Writer

As SailPoint’s President of Worldwide Discipline Operations, Matt Mills brings over 30 years of expertise in enterprise software program and promoting complicated options, in addition to a confirmed monitor file of main high-growth gross sales organizations.
He most just lately served as CEO of MapR, the place he repositioned the corporate as an enterprise-class converged knowledge platform, constructing out the gross sales workforce to maintain tempo with the corporate’s development. Previous to that, he spent 15 years at Oracle main two divisions inside the firm’s North American gross sales group.