
This bonus episode of Identity at the Center is brought to you with support from Elimity. Jeff and Jim sit down with Maarten Decat, co-founder and CEO of Elimity, to explore the emerging product category known as IVIP, Identity Visibility and Intelligence Platforms. Maarten explains how Elimity was built around a question every IAM practitioner eventually faces: who can actually do what within our organization? The conversation covers why IVIP is distinct from traditional IGA, how identity data graphs provide deeper visibility than flat entitlement lists, and what regulatory drivers like SOC 2, ISO 27001, and DORA are pushing organizations toward this space. They also discuss deployment patterns, integration approaches, ROI metrics for leadership, and what Maarten calls provable control. The episode closes with a memorable story about Elimity branded Belgian beer and a very formal legal letter. Learn more at elimity.com/idac.
Connect with Maarten: https://www.linkedin.com/in/maartendecat/
Learn more about Elimity: https://elimity.com/idac
Connect with us on LinkedIn:
Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/
Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/
Visit the show on the web at idacpodcast.com
CHAPTER TIMESTAMPS
00:00 Introduction and ax-throwing memories from EIC Berlin
01:35 Introducing Maarten Decat, co-founder and CEO of Elimity
01:57 How identity chose Maarten: from PhD to startup founder
03:09 The Elimity origin story and the problem it set out to solve
04:52 Defining IVIP: Identity Visibility and Intelligence Platforms
05:31 Where did the name Elimity come from?
06:57 Why identity visibility has become a security priority now
09:02 What organizations were doing before IVIP existed
11:16 Can IGA do what IVIP does? Addressing the skeptics
14:20 The identity data graph: deeper and wider than IGA
16:20 IVIP and IGA as complementary tools, not competitors
16:49 What falls outside IVIP scope: automated provisioning
18:01 IVIP as the intelligence layer in your IAM stack
19:45 What data sources connect into an IVIP platform
21:44 Extending visibility to non-human identities
22:00 M&A use cases: gaining visibility across two organizations
23:55 IVIP and the identity fabric concept
25:18 Visibility, intelligence, and actions: building the right stack
26:36 How deployments typically start and what early wins look like
28:44 Integration approaches and realistic effort timelines
32:00 What success looks like at six to twelve months
36:07 Metrics and ROI: talking to leadership about identity risk
38:14 Case studies and customer examples on the Elimity website
38:58 What every IAM practitioner should know about IVIP
40:12 Elimity's global reach: EU, US, and Middle East
41:42 The Elimity branded beer story and a very formal legal letter
46:43 Wrap-up and final thoughts
KEYWORDS
IVIP, identity visibility and intelligence platforms, IGA, identity governance, access control, identity data graph, Elimity, Maarten Decat, non-human identities, access risk, provable control, SOC 2, ISO 27001, DORA, CCPA, cybersecurity, PAM, IAM, identity and access management, EIC, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald