One of the many questions that companies face when introducing new enterprise systems either to provide new functionality or incorporate legacy systems from a merger or acquisition is “How do we identify and manage access rights?”
Not only do new access approval processes need to be established, but a common platform to define and execute processes, reliably document approvals and provide users with an acceptable user experience is often not in place to handle the additional workload. Corporate IT is also faced with the challenge responding quickly to changes in access rules or approval chains.