Gathid introduces model for identity and access governance

April 10, 2024
The patented directed graph model delivers secure, scalable identity and access governance.

Gold Coast, Australia and Seattle, Washington– April 10, 2024 – Gathid today announced the debut of its new approach to identity and access governance. Inspired by the power of gathered identities, the platform pinpoints identity and access anomalies with its patented directed graph model.

Designed for rapid deployment, immediate applicability, and smooth integration across complex IT infrastructures, this solution tackles the critical need for scalable and cost-effective identity management.

A New Approach to Identity and Access Governance

Identity and Access Management (IAM) solutions require centralized approaches. This results in reliance on a single or small handful of vendors to facilitate large-scale contiguous deployments that maintain real-time identity concurrency between all systems. These large-scale deployments come at a high cost to purchase, migrate, and enable.

Building on 20 years of dedicated experience solving complex physical security challenges for some of the largest companies in the world, Peter Hill, founder and CEO of Gathid, and his team identified a need for a solution that seamlessly integrates with existing infrastructure to help organizations tackle today’s increasingly complex identity security challenges.

In Q4, 2023, Gathid successfully transitioned from physical security to identity governance to address this gap. This strategic move leverages Gathid’s international scale to address the growing need for robust identity management.

“While deploying our physical access security products for some of the world’s largest companies, including five of the Fortune 500’s top 50 companies, we saw firsthand how much identity debt most organizations carry,” Hill said. “We realized organizations that are not as mature as these industry giants didn’t have the resources to effectively identify who has access to what and – more importantly – whether they should have access at all. This inspired us to invent a solution that helps organizations strengthen access management without completely overhauling their people, processes, physical infrastructure, and technology.”

Key Capabilities

Gathid’s strength lies in its novel application of a patented directed graph model for identity and access improvements. It offers a fast-to-deploy, resource-efficient approach that can function across disconnected systems in hybrid and multi-cloud environments.

This dynamic patented identity model is reconstructed daily from the ground up, liberating organizations from the constraints of system syncs and incomplete delta reports. If automation misses a beat, Gathid highlights what’s amiss, directing users' focus to critical compliance clean-up areas. This ongoing daily refresh cycle is crucial in maintaining an ever-accurate, ever-compliant access ecosystem.

Key benefits include:

  • Identity graph technology: Gathid’s patented approach creates a daily identity graph model, enabling the constructed representation of virtual data relationships between identities and access rights to systems. This provides a comprehensive and holistic view of the entire enterprise identity landscape.
  • Rapid deployment: Gathid offers a streamlined, easy-to-deploy solution that receives and models data from digital, operational technology (OT), and physical access control systems (PACS) without requiring admin rights or complex bi-directional integration. Gathid delivers immediate insights and ROI, unlike the traditional approach of integrating all the disparate systems together, which can take months or years to design and implement.
  • Affordable insight for every system: Gathid bridges the accessibility gap in identity governance, offering scalable solutions tailored for organizations of all sizes. It can analyze role-based access and role mining for any system, including legacy, air-gapped, or specialized systems, without the high costs of traditional approaches, which often include large consulting projects.
  • Toxic role combination alerts: Gathid's advanced algorithms can analyze data across diverse technologies and detect instances where identities have risky access privileges that violate security and compliance policies. This allows organizations to identify and rectify toxic role combinations, creating a meaningful and accurate identity overview.
  • Incident memory: Gathid empowers incident response with a historical record of identity security alterations, allowing for a detailed review of access rights changes before, during, and after an incident. It can also provide alerts and recommendations for mitigating and preventing future incidents.
  • Compatibility: The Gathid platform is completely independent of existing enterprise applications and can receive simple identity-related data from all systems, either manually or automatically. Gathid does not attempt to maintain concurrency of its identity model, simply receiving daily identity data to form its daily identity graph model and then archiving the model the following day when a new model will be created from fresh data feeds.

“The divestment of our physical security products and the rebranding to Gathid have allowed us to focus on the rapidly growing identity governance global market,” said Hill. “We have successfully migrated our customer base to the new Gathid infrastructure and are leveraging events like AISA CyberCon and strategic collaborations, including with KPMG, to generate high-quality sales opportunities. The market momentum we have achieved in a short period positions us for exceptional growth throughout 2024."