Secure identities and reduce risks by leveraging state of the art processes and tools that fit your needs

Identity and Access Management (IAM)

Identity and Access Management (IAM)

The rapid expansion of cloud adoption, the shift towards Identity as the new security perimeter, and the rise of artificial intelligence are fundamentally reshaping Digital Identity requirements and increasing overall solution complexity. In parallel, the rapid growth of non‑human identities—such as service accounts, APIs, bots, and machine identities—together with the emergence of agentic AI systems capable of autonomous action, is significantly expanding the identity attack surface and redefining how trust and access must be governed.

Against this backdrop of an evolving and increasingly diversified threat landscape, regulatory frameworks such as the Swiss nFADP and NIS2 play a critical role in setting clear expectations for security, privacy, and accountability, while complementing broader strategic drivers of Digital Identity initiatives. Addressing these challenges requires organizations to ground their cybersecurity strategies in clear business and risk objectives, while leveraging the advanced capabilities of modern Digital Identity solutions—including AI‑driven controls, cloud‑native scalability and security, and integrated privacy and compliance features—to maintain resilient, efficient, and future‑ready identity and access management environments

Our approach to Digital Identity

We identify and address three primary domains as the key areas of focus for implementing a robust identity and access strategy.

Workforce Identity and Access Management 

Efficiently managing employee identities and access is crucial for enhancing business efficiency and user experience. By utilising automated processes and user-friendly interactions, organisations can ensure seamless identity lifecycle management. This approach is key to improving operational efficiency and delivering high-quality user experiences within the corporate environment. 

Workforce IAM must evolve to manage both human users and the machine identities and AI agents that increasingly operate on their behalf.

Businesses are challenged with managing diverse workforce identities for secure collaboration with partners and remote employees amidst regulatory pressures and cybersecurity threats. Effective digital identity solutions are essential to protect assets, ensure compliance, and stay ahead of evolving legal requirements. Proactive workforce identity management safeguards against security risks and streamlines compliance processes, benefiting stakeholders like shareholders, employees, and customers. By prioritising workforce identity, organisations build digital trust, protecting data and fostering a secure environment for collaboration in today's dynamic work landscape.

Our offering​

We offer a comprehensive suite of services for workforce digital identity.

  • Our Digital Identity Assess & Design services help organisations elevate IAM from concept to a robust capability integral to strategy, processes, and IT infrastructure.
  • We guide our clients in transitioning to an optimal IAM state through practical implementation plans aligned with business objectives and best practices.
  • Our transformative approach to workforce digital identity projects involves aligning with key stakeholders and utilising the Business experience and Technology (BXT) model for best results.
  • We also offer digital accelerators to enhance IAM implementation quality and speed.
  • Additionally, we provide managed services for workforce digital identity to continuously evolve IAM capabilities in alignment with changing business needs.

Customer Identity and Access Management 

Managing customer identities brings a set of specific constraints involving heavy scalability, availability, and state-of-the-art user experience. Proper management of B2C identities requires carefully considering the information system's exposure to many externals with potentially no cybersecurity sensitivity.

CIAM increasingly must account for non‑human and AI‑enabled actors operating within digital ecosystems, with strong controls around trust, consent, and accountability.

Organisations must harmonise customer experience, security and costs to create a powerful CIAM solution that enhances customer satisfaction, loyalty, and revenue. CIAM solutions need to provide seamless and personalised experiences while ensuring security and compliance with regulations like GDPR and CCPA. Businesses also face the challenge of managing costs, maintaining agility, and enabling new business opportunities through effective CIAM implementation. By addressing these challenges, organisations can foster a customer-centric approach and drive business growth.

Our offering​

  • We offer successful CIAM projects locally and globally, offering a range of accelerators and assets such as the CIAM capability model, and a DevOps-based delivery solution, and unique digital assets like the Customer Identity Game and The Identity Lab.
  • Our methodology consists of three main phases that structure our CIAM services, supported by digital accelerators, standardised approaches, templates, and technical tools to automate CIAM processes.
  • We tailor CIAM solutions to fit clients' specific needs by assessing existing setups, designing target states, and creating roadmaps for implementation.
  • Our partners with leading CIAM tech providers like Microsoft, Ping, Okta, and Transmit to offer best-in-class solutions without creating technology lock-ins.
  • Our managed service offerings aim to reduce the burden of CIAM IT management and infrastructure activities, providing a human-led, technology-driven approach.
  • We engage various stakeholders within organisations through initiatives like 'The Customer Identity Game' and 'The Customer Identity Lab' to build knowledge, align stakeholders, and inspire organisations in CIAM transformation.

Privileged Access Management

Privileged access holders are amongst the riskiest users in the entire organisation. As such, their entitlements should be tightly controlled using modern dedicated processes and tools to ensure proper tracking and auditability to avoid critical disruptions to the organisation’s core business functions.

Non‑human identities and agentic AI represent a new class of privileged identities, requiring the same—if not stronger—controls as traditional human administrators.

Customer challenges regarding privileged access management include the need to adapt to rapidly evolving security risks such as threat actors, insider threats, and credential theft. The widespread adoption of remote work and cloud-based systems has increased the risk, requiring proactive measures to protect organisations from cyber threats. Many organisations struggle with maintaining visibility and control over high-risk permissions, both on-premises and in the cloud, especially when it comes to privileged accounts. Gaining control over these accounts is crucial for a modern security strategy to protect data and resources from cyber-attacks. Implementing Privileged Access Management (PAM) can help reduce the risk of compromised accounts, provide insights and control over privileged access, increase operational efficiency, and empower regulatory compliance

Our offering​

  • We offer comprehensive privileged access management (PAM) services, leveraging vast experience in Identity capabilities assessment and design.
  • Our team specialises in security controls, entitlement management best practices, and PAM architecture, utilising accelerators and both proprietary and third-party tools.
  • The conducts thorough security posture assessments using the PwC Maturity Model for IAM and PAM, extracting key findings and offering actionable recommendations.
  • Our approach involves analysing the current state of PAM, planning for implementation/integration, continuous improvement, designing PAM use cases and architecture, deploying solutions, operating day-to-day activities, building and testing enhancements, integrating processes and tools, and onboarding privileged accounts and applications.
  • Our goal is to design PAM program objectives and target state architecture tailored to each organisation, ensuring a seamless journey to securing privileged accesses and embedding PAM effectively within the organisation.
  • This holistic approach covers all aspects of PAM implementation and operation, providing a comprehensive roadmap and support throughout the process.

Key vendors partnerships

By leveraging our global strategic partnerships with leading vendors such as Microsoft, CyberArk, ForgeRock, SailPoint, and Okta, PwC enhances the efficiency and reliability of Digital Identity project delivery. These collaborations empower us to provide cutting-edge solutions, seamlessly integrating best-in-class technologies that meet evolving compliance requirements and drive sustainable business growth for our clients



Cyberark logo
Microsoft logo

Contact us

https://pages.pwc.ch/view-form?id=701Vl00001895kvIAA&embed=true&lang=en

Our experts

Fabian Faistauer

Digital Identity Leader, PwC Switzerland

+41 58 792 13 33

Email

Tanushree Chakraborty

Senior Manager, Digital Identity, PwC Switzerland

+41 79 617 98 86

Email