{"id":521394,"date":"2023-05-02T15:24:51","date_gmt":"2023-05-02T13:24:51","guid":{"rendered":"https:\/\/www.capgemini.com\/?post_type=research-and-insight&#038;p=890230"},"modified":"2025-03-27T05:42:13","modified_gmt":"2025-03-27T05:42:13","slug":"why-its-time-for-ai-in-identity-and-access-management","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","title":{"rendered":"why it\u2019s time for AI in Identity and access management"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=2880&amp;quality=70 1x, https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=1440&amp;quality=70 1x, https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=1024&amp;quality=70 1x, https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=768&amp;quality=70 1x, https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/04\/AI-in-Identity-dotcom-banners1.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Why it\u2019s time for AI in Identity AND access management<\/h1><\/div><div class=\"inner-row-insight download-btn\"><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=890230\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=890230&amp;text=\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=890230&amp;text=\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h4 class=\"wp-block-heading\" id=\"h-for-decades-organizations-have-been-grappling-with-the-challenge-of-providing-secure-yet-user-friendly-access-to-their-computer-systems-and-applications\">For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.<\/h4>\n\n\n\n<p>The sheer number of identities that many organizations hold today has become so overwhelming that it\u2019s practically impossible for human beings to keep track of them all, let alone manage access to them. AI\u2019s ability to process vast quantities of data in minutes, rather than months, can revolutionize our approach to IAM \u2013 and save us a lot of time in doing so. There are many benefits of using AI in IAM, but how do you implement it?<\/p>\n\n\n\n<p><strong>Download<\/strong> the point of view by our expert Mark Lawley, Senior IAM Consultant, to understand the best practices for implementing AI for IAM. Now is the time to embark on your AI in IAM journey.<\/p>\n\n\n\n<div class=\"wp-block-cg-blocks-autocloud-form undefined autocloudform\"><div class=\"section--autoCloud-form\"><div class=\"wrapperAutoCloudSection\" id=\"linkToForm\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-12 col-lg-6 left-img align-self-center escaper-left\"><\/div><div class=\"  col-md-12\"><div class=\"autoCloudForm\"><h3 class=\"formHelpText\">Download the PoV<\/h3>\t\t<div class=\"mf_forms__container \">\n\t\t\t\t\t\t\t\t<form id=\"mf_form_521396_2558474886\" class=\"mf_form__form row needs-validation\" action=\"\" method=\"post\" enctype=\"multipart\/form-data\" data-nosnippet>\n\n\t\t\t\t\t\t\t\t<input type=\"hidden\" name=\"form_id\" data-validate=\"number\" class=\"mf_form__id\" value=\"521396\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"form_title\" class=\"mf_form__title\" value=\"rni_why-it%e2%80%99s-time-for-ai-in-identity-and-access-management\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"wp_rest_nonce\" class=\"mf_form__wp_rest_nonce\" value=\"e7547fe114\" \/>\n\n\t\t\t\t<input type=\"hidden\" name=\"mf_form_conditional_logic\" class=\"mf_form__title conditional_logic\" value=\"\" \/>\n\t\t\t\t\n\t\t\t\t<input type=\"hidden\" name=\"mf_form_fields_country_dpo_field\" class=\"mf_form__title conditional_logic mf_form_fields_country_dpo_field\" value=\"\" \/>\n\n\t\t\t\t<!-- Anti-spam field -->\n\t\t\t\t<input type=\"text\" \n\t\t\t\t\tname=\"website_url\" \n\t\t\t\t\tclass=\"mf_field__url\" \n\t\t\t\t\tautocomplete=\"off\"\n\t\t\t\t\ttabindex=\"-1\"\n\t\t\t\t\taria-hidden=\"true\"\n\t\t\t\t\tstyle=\"position:absolute;left:-9999px;width:1px;height:1px;opacity:0;pointer-events:none;\" \n\t\t\t\t\/>\n\t\t\t<\/form>\n\n\t\t\t<div class=\"mf_form__success\" tabindex=\"0\" role=\"alert\">\n\t\t\t\tThank you for your submission. Download the <a title=\"https:\/\/go.capgeminigroup.com\/l\/95412\/2023-05-02\/7stc95\/95412\/1683024579ese0fziv\/ai_in_identity__access_management_pov__2023__1_.pdf\" href=\"https:\/\/prod.ucwe.capgemini.com\/se-en\/wp-content\/uploads\/sites\/20\/2023\/05\/AI_in_Identity__Access_Management_PoV__2023__1_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Point of view<\/a>.<\/p>\n\t\t\t<\/div>\n\t\t\t<div class=\"mf_form__errors\">\n\t\t\t\t<p>We are sorry, the form submission failed. Please try again.<\/p>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t<script>\n\t\t\twindow.MF_CONFIG521396 = {\"521396\":{\"errors\":[],\"redirect\":\"\"}};\n\t\t<\/script>\n\t\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.<\/p>\n","protected":false},"author":257,"featured_media":521395,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"b2a28f02-211c-4660-98e2-f79ea3ee8ae4\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":false,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":69,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[66],"theme":[69],"brand":[],"service":[34],"industry":[],"partners":[],"content-group":[],"class_list":["post-521394","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-point-of-view","theme-cybersecurity","service-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>why it\u2019s time for AI in Identity and access management - Capgemini Portugal<\/title>\n<meta name=\"description\" content=\"For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"why it\u2019s time for AI in Identity and access management\" \/>\n<meta property=\"og:description\" content=\"For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Portugal\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T05:42:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\",\"name\":\"why it\u2019s time for AI in Identity and access management - Capgemini Portugal\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg\",\"datePublished\":\"2023-05-02T13:24:51+00:00\",\"dateModified\":\"2025-03-27T05:42:13+00:00\",\"description\":\"For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/pt-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/pt-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"why it\u2019s time for AI in Identity and access management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/\",\"name\":\"Capgemini\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/4a58ac48fd0781800d85b33cab939b87\",\"name\":\"tejasdhonsale\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4fd97067ace08bda8aa80d435128fc9a14abae6780310338261a88bda6af1f58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4fd97067ace08bda8aa80d435128fc9a14abae6780310338261a88bda6af1f58?s=96&d=mm&r=g\",\"caption\":\"tejasdhonsale\"},\"url\":\"https:\/\/www.capgemini.com\/pt-en\/author\/tejasdhonsale\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"why it\u2019s time for AI in Identity and access management - Capgemini Portugal","description":"For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","og_locale":"en_US","og_type":"article","og_title":"why it\u2019s time for AI in Identity and access management","og_description":"For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.","og_url":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","og_site_name":"Capgemini Portugal","article_modified_time":"2025-03-27T05:42:13+00:00","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","url":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","name":"why it\u2019s time for AI in Identity and access management - Capgemini Portugal","isPartOf":{"@id":"https:\/\/www.capgemini.com\/pt-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg","datePublished":"2023-05-02T13:24:51+00:00","dateModified":"2025-03-27T05:42:13+00:00","description":"For decades, organizations have been grappling with the challenge of providing secure yet user-friendly access to their computer systems and applications.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#primaryimage","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg","contentUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/pt-en\/"},{"@type":"ListItem","position":2,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/pt-en\/research-and-insight\/"},{"@type":"ListItem","position":3,"name":"why it\u2019s time for AI in Identity and access management"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/pt-en\/#website","url":"https:\/\/www.capgemini.com\/pt-en\/","name":"Capgemini","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/4a58ac48fd0781800d85b33cab939b87","name":"tejasdhonsale","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4fd97067ace08bda8aa80d435128fc9a14abae6780310338261a88bda6af1f58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fd97067ace08bda8aa80d435128fc9a14abae6780310338261a88bda6af1f58?s=96&d=mm&r=g","caption":"tejasdhonsale"},"url":"https:\/\/www.capgemini.com\/pt-en\/author\/tejasdhonsale\/"}]}},"theme_term_info":[{"id":69,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[{"id":34,"name":"Cybersecurity"}],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"why it\u2019s time for AI in Identity and access management","url":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Portugal","logo":""},"keywords":[],"dateCreated":"2023-05-02T13:24:51Z","datePublished":"2023-05-02T13:24:51Z","dateModified":"2025-03-27T05:42:13Z"},"rendered":"<meta name=\"parsely-title\" content=\"why it\u2019s time for AI in Identity and access management\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-05-02T13:24:51Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Portugal","distributor_original_site_url":"https:\/\/www.capgemini.com\/pt-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2023\/05\/AI-in-Identity-dotcom-banners1.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/research-and-insight\/521394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/users\/257"}],"version-history":[{"count":4,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/research-and-insight\/521394\/revisions"}],"predecessor-version":[{"id":529839,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/research-and-insight\/521394\/revisions\/529839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media\/521395"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media?parent=521394"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/tags?post=521394"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/research-and-insight-type?post=521394"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/theme?post=521394"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/brand?post=521394"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/service?post=521394"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/industry?post=521394"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/partners?post=521394"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/content-group?post=521394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}