Become a Creator today!Start creating today - Share your story with the world!
Start for free
00:00:00
00:00:01
#417 - Sponsor Spotlight - Elimity image

#417 - Sponsor Spotlight - Elimity

E417 · Identity at the Center
Avatar
0 Plays2 hours ago

This bonus episode of Identity at the Center is brought to you with support from Elimity. Jeff and Jim sit down with Maarten Decat, co-founder and CEO of Elimity, to explore the emerging product category known as IVIP, Identity Visibility and Intelligence Platforms. Maarten explains how Elimity was built around a question every IAM practitioner eventually faces: who can actually do what within our organization? The conversation covers why IVIP is distinct from traditional IGA, how identity data graphs provide deeper visibility than flat entitlement lists, and what regulatory drivers like SOC 2, ISO 27001, and DORA are pushing organizations toward this space. They also discuss deployment patterns, integration approaches, ROI metrics for leadership, and what Maarten calls provable control. The episode closes with a memorable story about Elimity branded Belgian beer and a very formal legal letter. Learn more at elimity.com/idac.




Connect with Maarten: https://www.linkedin.com/in/maartendecat/


Learn more about Elimity: https://elimity.com/idac




Connect with us on LinkedIn:


Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/


Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com




CHAPTER TIMESTAMPS


00:00 Introduction and ax-throwing memories from EIC Berlin

01:35 Introducing Maarten Decat, co-founder and CEO of Elimity

01:57 How identity chose Maarten: from PhD to startup founder

03:09 The Elimity origin story and the problem it set out to solve

04:52 Defining IVIP: Identity Visibility and Intelligence Platforms

05:31 Where did the name Elimity come from?

06:57 Why identity visibility has become a security priority now

09:02 What organizations were doing before IVIP existed

11:16 Can IGA do what IVIP does? Addressing the skeptics

14:20 The identity data graph: deeper and wider than IGA

16:20 IVIP and IGA as complementary tools, not competitors

16:49 What falls outside IVIP scope: automated provisioning

18:01 IVIP as the intelligence layer in your IAM stack

19:45 What data sources connect into an IVIP platform

21:44 Extending visibility to non-human identities

22:00 M&A use cases: gaining visibility across two organizations

23:55 IVIP and the identity fabric concept

25:18 Visibility, intelligence, and actions: building the right stack

26:36 How deployments typically start and what early wins look like

28:44 Integration approaches and realistic effort timelines

32:00 What success looks like at six to twelve months

36:07 Metrics and ROI: talking to leadership about identity risk

38:14 Case studies and customer examples on the Elimity website

38:58 What every IAM practitioner should know about IVIP

40:12 Elimity's global reach: EU, US, and Middle East

41:42 The Elimity branded beer story and a very formal legal letter

46:43 Wrap-up and final thoughts



KEYWORDS


IVIP, identity visibility and intelligence platforms, IGA, identity governance, access control, identity data graph, Elimity, Maarten Decat, non-human identities, access risk, provable control, SOC 2, ISO 27001, DORA, CCPA, cybersecurity, PAM, IAM, identity and access management, EIC, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald

Recommended