Today’s technological landscape is evolving at an unprecedented rate. Interconnected systems, digitalisation, smart-working, utilisation of private devices for business and heavy reliance on systems to deliver products and services require highly effective and efficient user access management processes and effective risk mitigation. Risks in this area range from improper access, to cyber-security threats, leakage of sensitive information, business disruptions and company reputational damages.