Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Access Management Orchestration Suite (KAMOS)

Automating and accelerating access management modernization for PingAccess™ and PingFederate™

Automating and accelerating access management modernization for PingAccess and PingFederate


Building, testing, and managing access management application policies can be a complex process. Manual intervention often leads to errors, inconsistency, and difficulty in managing the access management policy life cycle.

Building, testing, and managing access management application policies can be a complex process. Manual intervention often leads to errors, inconsistency, and difficulty in managing the access management policy life cycle. KPMG Cyber Security professionals understand these complexities. With deep specialization in Ping Identity technologies, our professionals developed the KPMG Access Management Orchestration Suite (KAMOS) v6.0 to address these challenges, specifically to reduce complexity, risk, and effort in managing these solutions.

KPMG Access Management Orchestration Suite (KAMOS)

KAMOS is a suite of purpose-built orchestration tools to simplify, automate, customize, and ease each of the policy life cycle phases with DevOps style policy automation and management capabilities.

Key features

DevOps Style Policy Automation:

  • Customization
  • Build, Migration, Recover/Restore
  • Self-Service-based Policy Refinement
  • Integrated Policy Testing
  • Intuitive Dashboard for Access Management Monitoring

Architecture

The KAMOS user interfaces are built upon REST APIs — meaning everything that can be accomplished in the tool can be automated and called from DevOps pipelines.

KAMOS can be deployed as a single application with standard configurations for all environments, or as multiple deployments for various environments in a physically segregated deployment model.

 

YouTube thumbnail image

Automating and accelerating access management modernization for PingAccess and PingFederate

Dive into our thinking:

KPMG Access Management Orchestration Suite (KAMOS) v6.0

Automating and accelerating access management modernization in PingAccess and PingFederate

Download PDF

Meet our team

Image of Jacob Pszonowsky
Jacob Pszonowsky
Principal, Cyber Security, KPMG US

Explore more

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline