In large corporate IT environments obtaining the control and overview of thousands of internal or external users, with access to a multitude of systems and applications, is not a simple task. Surveys show that up to 90% of users have unauthorized access to confidential business data. As such, employees are considered the most likely source of corporate security breaches – whether they happen deliberately or unintentionally. Consequently, an identity and access management system are a prerequisite for securing businesses against security breaches and leaks of business-critical data.