{"id":27656,"date":"2025-09-17T16:42:41","date_gmt":"2025-09-17T14:42:41","guid":{"rendered":"https:\/\/de.nexis-secure.com\/?p=27656"},"modified":"2025-09-17T19:28:34","modified_gmt":"2025-09-17T17:28:34","slug":"from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics","status":"publish","type":"post","link":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/","title":{"rendered":"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics"},"content":{"rendered":"<p id=\"ember2954\">In Gartner\u2019s <em>Digital Identity 2025 Hype Cycle<\/em>, a new category has emerged: Identity Visibility and Intelligence Platforms (IVIP). The term is gaining attention across the industry, and with it, debates about whether it should be seen as a platform, a set of capabilities, or something else entirely.<\/p>\n<p id=\"ember2955\">Let\u2019s start with the definition of IVIP by Gartner:<\/p>\n<p id=\"ember2956\">\u201c<em>Identity visibility and intelligence platforms are products that provide rapid integration and visibility for identity and access management (IAM) relevant data, typically paired with advanced analytics (often AI-enabled) capabilities. This innovation provides a single view of IAM data, activity\/events, relationships, configuration and posture to enable rapid improvement of all other integrated IAM controls and capabilities supporting both improved security and business enablement.<\/em>\u201d [1]<\/p>\n<h2 id=\"ember2957\"><strong>What Problem Does IVIP Solve?<\/strong><\/h2>\n<p id=\"ember2958\">Modern Identity and Access Management stacks are becoming increasingly complex. A large enterprise CISO today manages around 83 different cybersecurity tools [2]. Many of these tools are not well integrated. The result is fragmented visibility of identity-related data and missing intelligence and insights on what is actually covered, managed, or protected \u2013 where the gaps are, and what potential risks remain.<\/p>\n<p id=\"ember2959\">Let me give an example: IGA (Identity Governance and Administration) and PAM (Privileged Access Management) are relatively mature disciplines. Yet many organizations still struggle with a simple but critical question: who is allowed to do what? Role names and entitlements often fail to give business users meaningful answers, hindering assignments and recertifications.<\/p>\n<p id=\"ember2960\">The situation becomes even more complex with privileged accounts. Regulated companies must meet Segregation of Duties (SoD) requirements. Too often, IGA and PAM systems run in parallel without real integration \u2013 one covering the entire workforce, the other just administrators. This leads to conflicts that remain invisible when systems are not integrated.<\/p>\n<p id=\"ember2961\">Take HR as an example: one system manages business roles, another manages administrative accounts. On paper, SoD appears intact. But without an integrated view, overlaps remain hidden \u2013 such as when a user holds an HR administrator role in one system while also carrying conflicting HR business entitlements in another. Technically, the systems are separated. Functionally, the same person can both define and manipulate sensitive data. That is a direct SoD violation that only becomes visible with true end-to-end integration.<\/p>\n<h2 id=\"ember2962\"><strong>Identity Fabrics and the Missing Layer<\/strong><\/h2>\n<p id=\"ember2963\">\u201c<em>The Identity Fabric is not an abstract ideal [\u2026]. It is deliberately designed as a pragmatic, capability-driven framework that supports both the modernization of legacy IAM (brownfield) and, where applicable but rather rarely, the creation of new architectures (greenfield). Together with the\/an IAM Reference Architecture, it provides a concrete capability model [\u2026]<\/em>\u201d <a id=\"ember2964\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/in\/matthias-reinwarth-50183125\/\" data-wplink-edit=\"true\">Matthias Reinwarth<\/a> , Director Practice IAM at <a tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/company\/kuppingercole\/\" data-test-app-aware-link=\"\">KuppingerCole Analysts<\/a>, [3].<\/p>\n<p id=\"ember2965\">Identity fabrics define the capabilities required for a modern IAM environment. To bring it to life, each capability has to be provided by a certain service or product. But the vendor landscape looks different: tools overlap, leave gaps, or cover multiple areas in ways that don\u2019t align neatly to the identity fabrics model. Enterprises end up with a patchwork of solutions stitched together to approximate the target picture.<\/p>\n<p id=\"ember2966\">That is where IVIP comes in. The concept addresses the need for a layer that spans all kinds of identities, all types of IAM, and provides a unified governance dashboard. It brings visibility and intelligence across the patchwork. But not just that. It\u2019s not enough to have just insights, optimization and remediation will be the key. Be it optimizing the authorization landscape, providing recommendation to business users or acting autonomously, when thinking of ISPM (Identity Security Posture Management) capabilities, where the systems remediate any deviation and anomalies for a learned \u201cwhat does good look like\u201d.<\/p>\n<p id=\"ember2967\">In some discussions it was argued that it\u2019s not a substitute for proper identity fabric design and implementation. And that\u2019s true as well. However, it\u2019s a pragmatic way to span a holistic governance layer across a variety of products, filling critical gaps towards the ideal target picture of an identity fabric. Is this good or bad? Some analysts question whether IVIP helps, or if it risks reinforcing today\u2019s fragmented implementations. In reality, fragmentation has always been part of IT. Complexity has only grown over the past 20 years, and technological advances \u2013 generative and agentic AI being the latest example \u2013 far faster than enterprise products can keep up. The result is a patchwork, and the real question is how we manage it while improving outcomes. It simply reflects the reality of fragmented solutions and systems. There is no indication that this will change soon, nor that perfectly integrated identity fabric can be built based on single standard products.<\/p>\n<h2 id=\"ember2968\"><strong>Platform or Capability?<\/strong><\/h2>\n<p id=\"ember2969\">So, is IVIP a platform? It depends. At its core, it is a sum of capabilities \u2013 that can be achieved in different ways, with different tools. If a product covers enough areas, the \u201cplatform\u201d label may make sense. But the label itself is less important than the value it brings.<\/p>\n<h2 id=\"ember2970\"><strong>The Nexis Perspective<\/strong><\/h2>\n<p id=\"ember2971\"><a tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/company\/nexis-gmbh\/\" data-test-app-aware-link=\"\">Nexis<\/a> was also mentioned in this context in Gartner\u2019s <em>Hype Cycle for Digital Identity 2025<\/em> [1] \u2013 both for IVIP and for AI in Access Administration \u2013 underlining the relevance of these concepts for the future of identity management and the implementation of identity fabrics.<\/p>\n<p id=\"ember2972\">From a Nexis point of view, IVIP aligns perfectly with our capabilities and puts a label on what we\u2019ve been doing for almost two decades. Our ambition has always been to create Identity Visibility and Intelligence for the business \u2013 supported by smart visualizations, intuitive analytics, AI assistants, and an outstanding user experience \u2013 bringing the topic to where it belongs: the business side.<\/p>\n<p id=\"ember2973\">With NEXIS 4 we manage authorizations \u2013 policies, roles, segregation of duties policies, and entitlements \u2013 across a wide range of systems. This includes different IGA environments, combinations of IGA, NHI, and PAM, and our ISPM capabilities even extend to Access Management products. This enables us to support least privilege use cases by removing unused authorizations and reducing costs when assigned licenses can be retired.<\/p>\n<p id=\"ember2974\">Intelligence is powered by various forms of artificial intelligence and smart visualizations for information representation. Machine learning with reinforced training based on user feedback helps simulate and design optimal policy and role structures. NICO, the NEXIS Intelligent Co-Pilot, is woven into the system and provides recommendations to users. Explainable AI educates users and offers clear reasoning for why access should be granted or denied, or why other actions should be executed. This directly addresses the growing demand for cybersecurity AI assistants, which are also recognized in Gartner\u2019s Hype Cycle.<\/p>\n<p id=\"ember2975\">With NEXIS 4 and GenAI, the creation of regulatory documentation \u2013 such as authorization concepts required by DORA \u2013 can be accelerated, enabling proper visibility into every IAM-managed system, be it human or non-human identities such as service accounts. This is an important part of our overarching application onboarding capabilities. On top of that, documentation can now be leveraged for AI-based enterprise workflows to get ahead of the curve.<\/p>\n<p id=\"ember2976\">We are driven to provide business users with visibility and intelligence in a form they can understand. IVIP is not just a technical convenience \u2013 it is a business enabler. By delivering visibility and intelligence across the identity fabric, enterprises gain control, reduce risk, and make governance decisions that stand up to scrutiny.<\/p>\n<h2 id=\"ember2977\"><strong>References<\/strong><\/h2>\n<p id=\"ember2978\">[1] Sangiorgio, N., &amp; Harris, N.\u00a0 (July 14, 2025). <em>Hype Cycle for Digital Identity, 2025<\/em> (ID G00830736). Gartner, Inc. <a tabindex=\"0\" href=\"https:\/\/www.gartner.com\/interactive\/hc\/6718134\" target=\"_self\" data-test-app-aware-link=\"\">https:\/\/www.gartner.com\/interactive\/hc\/6718134<\/a><\/p>\n<p id=\"ember2979\">[2] IBM Institute for Business Value, &amp; Palo Alto Networks. (2024). <em>Capturing the cybersecurity dividend: How security platforms generate business value.<\/em> IBM. <a tabindex=\"0\" href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/report\/unified-cybersecurity-platform\" target=\"_self\" data-test-app-aware-link=\"\">https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/report\/unified-cybersecurity-platform<\/a><\/p>\n<p id=\"ember2980\">[3] Reinhard, M. (September 16, 2025). <em>Comments on LinkedIn.<\/em> LinkedIn. <a tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:ugcPost:7373351315298631682?commentUrn=urn%3Ali%3Acomment%3A%28ugcPost%3A7373351315298631682%2C7373590864578895872%29&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287373590864578895872%2Curn%3Ali%3AugcPost%3A7373351315298631682%29\" target=\"_self\" data-test-app-aware-link=\"\">https:\/\/www.linkedin.com\/feed\/update\/urn:li:ugcPost:7373351315298631682?commentUrn=urn%3Ali%3Acomment%3A%28ugcPost%3A7373351315298631682%2C7373590864578895872%29&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287373590864578895872%2Curn%3Ali%3AugcPost%3A7373351315298631682%29<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Gartner\u2019s Digital Identity 2025 Hype Cycle, a new category has emerged: Identity Visibility and Intelligence Platforms (IVIP). The term is gaining attention across the industry, and with it, debates [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":27111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-27656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"description\" content=\"Don&#039;t miss our latest Newsletter NEXIS Blog Post about Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t miss our latest Newsletter NEXIS Blog Post about Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-17T14:42:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T17:28:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Academy-Nexis-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"yannickglatzel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"yannickglatzel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\"},\"author\":{\"name\":\"yannickglatzel\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/f6c34d8c441030bf6b43117efa8d50aa\"},\"headline\":\"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics\",\"datePublished\":\"2025-09-17T14:42:41+00:00\",\"dateModified\":\"2025-09-17T17:28:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\"},\"wordCount\":1284,\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\",\"url\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\",\"name\":\"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"datePublished\":\"2025-09-17T14:42:41+00:00\",\"dateModified\":\"2025-09-17T17:28:34+00:00\",\"description\":\"Don't miss our latest Newsletter NEXIS Blog Post about Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/f6c34d8c441030bf6b43117efa8d50aa\",\"name\":\"yannickglatzel\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/author\/yannickglatzel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics - NEXIS - Enter a new level of Enterprise Authorization Governance","description":"Don't miss our latest Newsletter NEXIS Blog Post about Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/","og_locale":"en_US","og_type":"article","og_title":"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"Don't miss our latest Newsletter NEXIS Blog Post about Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics","og_url":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_published_time":"2025-09-17T14:42:41+00:00","article_modified_time":"2025-09-17T17:28:34+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Academy-Nexis-1-scaled.jpg","type":"image\/jpeg"}],"author":"yannickglatzel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"yannickglatzel","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#article","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/"},"author":{"name":"yannickglatzel","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/f6c34d8c441030bf6b43117efa8d50aa"},"headline":"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics","datePublished":"2025-09-17T14:42:41+00:00","dateModified":"2025-09-17T17:28:34+00:00","mainEntityOfPage":{"@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/"},"wordCount":1284,"publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"image":{"@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/","url":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/","name":"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage"},"image":{"@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","datePublished":"2025-09-17T14:42:41+00:00","dateModified":"2025-09-17T17:28:34+00:00","description":"Don't miss our latest Newsletter NEXIS Blog Post about Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#primaryimage","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/from-patchwork-to-governance-the-role-of-ivip-in-modern-identity-fabrics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"From Patchwork to Governance: The Role of IVIP in Modern Identity Fabrics"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/f6c34d8c441030bf6b43117efa8d50aa","name":"yannickglatzel","url":"https:\/\/de.nexis-secure.com\/de\/author\/yannickglatzel\/"}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/27656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=27656"}],"version-history":[{"count":9,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/27656\/revisions"}],"predecessor-version":[{"id":27684,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/27656\/revisions\/27684"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media\/27111"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=27656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/categories?post=27656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/tags?post=27656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}