Lighthouse Blog

  • Lighthouse Blog
  • The Five Key Challenges with Legacy IAM - IGA Implementations

The Five Key Challenges with Legacy IAM - IGA Implementations

The Five Key Challenges with Legacy IAM - IGA Implementations

The majority of IAM and IGA implementations today are based on using traditional (legacy) architecture approaches and processes (i.e. custom developed scripts, monolithic infrastructure, static and inflexible IAM data mappings, point-to-point connectors, and multi-year IAM Program roadmaps). As a result, some organizations are not able to easily modernize their IAM Programs and technology components. This along with industry changes and ever-changing cybersecurity threats, users and devices, introduce a significant challenge for organizations to defend against cybersecurity threats or proactively improve their security posture. Here are the five key challenges we see with enterprises and organizations with traditional legacy IAM and IGA implementations:


  1. Traditional approaches to executing monolithic IAM Programs. IAM Programs today tend to be resource intensive (lack of IAM subject matter expertise) multi-year, multi-million-dollar investments, and very intrusive into business processes while not showing quick wins or progress. These programs are also hindered by the remaining key challenges below.
  1. Legacy technology components, scripts, and infrastructure are the cause of significant technical debt. These components do not support an agile and nimble set of IAM/IGA capabilities in a hybrid compute (i.e. Cloud or hybrid) architecture. As a result, making changes to these components require custom modifications to the existing code base, costly professional services engagements, and long time frames to deliver.
  1. Legacy IAM approaches cannot efficiently introduce change due to legacy architecture. These approaches do not efficiently support continuous business driven changes for common IAM/IGA problems; especially when dealing with legacy monolithic architectures and systems. These systems are large and unable to introduce changes quickly and efficiently,
  1. Legacy IGA approaches and technology components use Inflexible data schemas. These technology components do not support efficient and effective processing of complex data for establishing a consistent access and governance model for supporting dynamic and ever-changing organization needs.
  1. Legacy IAM approaches and technology do not readily integrate with existing Cybersecurity stacks. These components do not have the capabilities to inherently support complex Cybersecurity – IGA data relationships and do not readily support real time Cybersecurity data streaming.

At Good Dog Labs, we focus on helping our customers address these five key challenges head on! Want to modernize your legacy IAM or IGA Program? Good Dog Labs, a Lighthouse Company, can help by introducing a short advisory service in conjunction with Perseus IAM. This is the world’s first next generation IAM Microservices platform that is able to quickly introduce IAM Program changes, lower your long-term costs, and integrate directly with your existing IAM, IGA, and cybersecurity stacks for a variety of use cases.

Learn more about IAM Advisory Assessments

Learn more about Perseus IAM


About Aldo Pietropaolo

Aldo Pietropaolo is a cybersecurity evangelist, identity security expert, and co-founder of Good Dog Labs, A Lighthouse Company. Good Dog Labs, A Lighthouse Company modernizes identity and access management and governance for SMB’s and large enterprises using advisory and implementation services in addition to bringing new innovative products such as Perseus IAM ( to market.

Related Posts
Analytics Choosing Smarter Analysis Over Routine Reports Can Improve Security Intelligence
Security Managing and Securing Devices Begins With Knowing That They’re There