As a result, enterprises have re-examined their current Identity and Access Management (IAM) processes and have begun to look for new IAM approaches to ensure that their organizations are safe from access-related security breaches, optimize the operationalcosts associated with access control and meet their internal and external compliance requirements.