New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Startups & Leaders

No Loose Ends: An Identity Fix Beneath a Footwear Empire

Hugh Grant by Hugh Grant
August 10, 2025
in Startups & Leaders
0
No Loose Ends: An Identity Fix Beneath a Footwear Empire
Share on FacebookShare on Twitter

At first glance, identity and access management sound like bureaucratic plumbing, something best left to auditors and admins. But the numbers tell a more dramatic story. Verizon’s 2024 Data Breach Investigations Report points out that 83% of hacking-related breaches involve stolen credentials or brute-force attempts. The 2024 Cost of a Data Breach Report by IBM puts credential compromises at the top of data breach causes, with an average cost of $4.88 million. Despite these dangers, enterprises across the world still use spreadsheets, email chains, and manual scripts for critical access decisions. 

That brittle setup becomes particularly dangerous in consumer-facing enterprises, where milliseconds of website uptime can literally affect a marketing calendar. Picture a global sportswear label; a household name, instantly recognisable logo, pushing a limited-edition sneaker drop to millions of fans. Should the underlying identity stack stall, not only do online queues collapse, but social media erupts in real time.  Revenue disappears, reputations take a beating, and boardrooms echo with the question: How come simple login tasks continue to break? 

The company’s aging identity platform was buckling under the pressure of remote work, microservices, and nearly constant product launches. Surendra Vitla, a programmer analyst at Cognizant Technology Solutions, was assigned the task. His job title does not scream saviour. Neither does his manner; colleagues describe him as more of a listener than a talker. Yet over the next twelve months, Surendra orchestrated an overhaul that turned identity from a bottleneck into a background hum, and in doing so, offered a sketch of what modern security can look like when it is allowed to move at the speed of the business.

The Overdue Upgrade

The immediate pain point was SailPoint IdentityIQ, the core platform used to provision and govern access for tens of thousands of employees and contractors. The software was two major versions behind, running on infrastructure held together by sympathetic sysadmins and a patchwork of custom scripts. Any serious lift‑and‑shift threatened to stop work on the factory floor and in flagship stores alike.

Surendra approached the task like a careful mechanic rebuilding an engine while the car is still lapping the track. Before a single package was installed, he mapped data flows across continents, time zones, and vendor contracts. “Identity looks technical, but it’s mostly sociology,” he said in the discussion for this story. “You need to know who actually owns which decisions, not just what the org chart claims.”

With that map in place, he led the leap from IdentityIQ 7.3p1 to 8.0p1, standing up a brand‑new clustered environment in parallel with the old one. Cut‑over happened during an overnight window so tight that a late pizza delivery would have thrown off the plan. By dawn, retail staff in Tokyo were clocking in as usual, unaware that a system they relied on had quietly swapped its foundation.

Automating the Mundane

The upgrade, substantial as it was, solved only half the puzzle. Provisioning still required humans to shuttle requests between service desks and security queues. Surendra believed the only sustainable fix was to borrow techniques from software engineering, continuous integration, automated testing, instant rollback, and apply them to identity. He developed a series of Jenkins pipelines to automate SailPoint deployments, significantly improving consistency and reducing operational effort. This also ensured that every change was traceable as code, making rollback and troubleshooting more reliable and auditable.

Not everyone was convinced at first. An internal memo flagged the idea of “DevOps for IAM” as risky: What if an automated push misconfigures privileges at scale? The counter‑argument, backed by incident logs, was that humans already did this on a regular basis; at least, automation would leave a trail.

Seeing in Real Time

Security teams often discover breaches days or weeks after the fact, when log files are bulk‑exported for analysis. Surendra’s next move was to collapse that delay. He pumped the identity logs through an ELK stack, on top of which he placed continuous vulnerability detection with Tenable. So the dashboard is a live screen full of alerts. A misfired policy tweak in Berlin could be spotted and reversed by analysts in Bengaluru before end users felt the glitch.

Governing at Scale

Compliance, the perpetual shadow of multinational business, required its own set of gears. Surendra coded event handlers that adjusted password policies to local data‑protection laws, while workflow templates obliged business managers, not just IT, to sign off on sensitive access. In the subsequent audit cycle, the company noted a substantial decline in access-review exceptions, which were credited to the streamlined workflows and enhanced compliance protocols implemented in the project. 

Measuring the Impact

The overhaul’s full impact may be hard to quantify, but several tangible shifts stood out. Manual provisioning was reduced by over 70%, effectively freeing thousands of hours that service desk teams previously spent on repetitive requests. Audit preparation, often a marathon of spreadsheet cross-checks, became markedly smoother, with centralized evidence cutting prep time by half. Perhaps most crucially, system stability was preserved even during high-traffic product launches. One internal report noted a dramatic improvement in the time it took to detect configuration errors; what once took days could now be flagged and addressed within minutes, a shift enabled by the real-time visibility introduced through the ELK and Tenable integrations.

A Quiet Success and Its Skeptic

Surendra Vitla himself is wary of hero narratives. Asked how the experience changed him, he pauses before answering: “You learn that the loudest success is sometimes the absence of noise, the product launch that didn’t crash, the audit that didn’t spiral. If people can’t tell anything happened, we probably did it right.”

Looking Ahead

The framework crafted for the sportswear giant is now seeding other transformation efforts across its affiliated brands. Surendra Vitla has prototyped a self-service analytics module. This module allowed business owners to easily answer questions about data access in plain language, addressing the concerns of regulators and executives. Early demos suggested that natural‑language queries could surface hidden privilege escalations without a security engineer in the loop.

Whether that vision materialises will depend on budgets, priorities, and the next unavoidable crisis in cyberspace. The past years offer quiet assurance that the path to digital trust is often about methodical, invisible work. This work is done when the world is asleep.

Previous Post

How Jamie Cashion Saddle-Trained Hollywood: The Man Behind Black Creek’s Authentic Horsework

Next Post

What is the Future of Online Grocery Shopping?

Hugh Grant

Hugh Grant

Hugh is a tech, business, and news writer with 20+ years of writing experience for various publications such as Scoop, TechBullion and others.

Next Post
Groceries

What is the Future of Online Grocery Shopping?

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026
New CISO Whisperer report highlights shift toward identity, integrity, and automation oversight

New CISO Whisperer report highlights shift toward identity, integrity, and automation oversight

February 23, 2026
AIUP and AINT*: FINQ Launches the First ETFs Fully Managed by Artificial Intelligence

AIUP and AINT*: FINQ Launches the First ETFs Fully Managed by Artificial Intelligence

February 11, 2026

Recommended

Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated AWS B2B marketing Business CISO CISO Whisperer coding Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech hi-tech Hi Auto Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz OurCrowd PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media