IAM Security - Identity & Access Management Security
IAM Security is the foundation of modern cybersecurity and requires a comprehensive strategy that goes far beyond traditional access controls. We develop advanced IAM security architectures that combine Zero Trust principles, AI-assisted threat detection, and adaptive security measures to optimally protect your identities and critical resources.
- ✓Zero Trust IAM architectures for modern security requirements
- ✓AI-assisted threat detection and behavioral analytics
- ✓Compliance-conformant security strategies for regulated industries
- ✓Proactive incident response and security operations
Your strategic success starts here
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
For optimal preparation of your strategy session:
- Your strategic goals and objectives
- Desired business outcomes and ROI
- Steps already taken
Or contact us directly:
Certifications, Partners and more...










IAM Security: Strategic Protection for Digital Identities
Our IAM Security Expertise
- Deep expertise in Zero Trust architectures and modern security paradigms
- AI-assisted security solutions for proactive threat detection
- Compliance expertise for regulated industries and international standards
- End-to-end approach from strategy through to operational implementation
Critical Security Factor
IAM systems are primary targets for cybercriminals. A strong IAM Security strategy is essential for protecting critical corporate data and complying with regulatory requirements such as DORA, NIS2, and GDPR.
ADVISORI in Numbers
11+
Years of Experience
120+
Employees
520+
Projects
We pursue a risk-based, multi-layered approach to IAM Security that combines proactive threat detection with adaptive security measures while meeting the highest compliance standards.
Our Approach:
Comprehensive risk assessment and threat landscape analysis
Zero Trust architecture design with defense-in-depth strategies
Implementation of advanced detection and response capabilities
Continuous monitoring and adaptive security optimization
Compliance integration and fulfillment of regulatory requirements
"IAM Security is the backbone of modern cybersecurity and requires a strategic approach that combines technical excellence with regulatory compliance. Our Zero Trust architectures and AI-assisted security solutions provide not only maximum protection against current threats, but also lay the foundation for future-proof security strategies. Integrating EU AI Act compliance into IAM systems will become a decisive competitive advantage."

Sarah Richter
Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
Our Services
We offer you tailored solutions for your digital transformation
IAM Security Assessment and Risk Analysis
Comprehensive assessment of your current IAM security posture with detailed risk analysis and strategic recommendations.
- Comprehensive Identity Threat Landscape Assessment
- Vulnerability scanning and penetration testing for IAM systems
- Risk modeling and threat actor profiling
- Compliance gap analysis for DORA, NIS2, and GDPR
Zero Trust IAM Architecture Design
Development of modern Zero Trust architectures for IAM systems with least privilege principles and adaptive security controls.
- Zero Trust Maturity Assessment and Roadmap Development
- Micro-segmentation and Network Access Control design
- Adaptive authentication and risk-based access control
- Policy-as-Code implementation for dynamic security policies
Advanced Threat Detection and Analytics
Implementation of AI-assisted threat detection systems with machine learning and behavioral analytics for proactive threat detection.
- User and Entity Behavior Analytics (UEBA) Implementation
- Machine learning anomaly detection
- Real-time Threat Intelligence Integration
- Automated response and orchestration workflows
Privileged Access Management Security
Specialized security solutions for privileged access with just-in-time access and session monitoring.
- Privileged account discovery and inventory management
- Just-in-Time and Just-Enough-Access implementation
- Session recording and privileged session analytics
- Secrets management and credential rotation automation
IAM Compliance and Regulatory Security
Compliance-conformant IAM security strategies for regulated industries with automated audit support.
- DORA and NIS2 compliance for IAM systems
- GDPR Privacy-by-Design for identity management
- Automated compliance monitoring and reporting
- Audit trail management and forensic readiness
IAM Security Operations and Incident Response
Establishment and optimization of security operations for IAM systems with automated incident response.
- IAM Security Operations Center (SOC) setup
- Incident response playbooks for identity-related threats
- Security orchestration and automated response
- Continuous security improvement and threat hunting
Our Competencies in Identity & Access Management (IAM)
Choose the area that fits your requirements
Implement modern access control systems that combine security and usability. Our access control solutions protect critical resources through intelligent authorization concepts and adaptive security policies.
Effective Access Governance forms the foundation for secure and compliant management of permissions in complex IT environments. It establishes clear structures, processes, and responsibilities for granting, monitoring, and regularly reviewing access rights. Our experts support you in designing and implementing tailored Access Governance that meets both compliance requirements and ensures operational efficiency.
Developing a solid IAM platform is the strategic foundation for modern enterprise security and digital transformation. Our enterprise-grade identity management systems combine the latest technologies, flexible architectures and intelligent automation into a comprehensive platform that not only meets the highest security standards but also acts as a business enabler for innovation and growth. From strategic conception through technical implementation to operational management, we create IAM platforms that equip your organization for the challenges of the digital future.
IAM architecture forms the strategic foundation of modern enterprise security, enabling organizations to develop highly flexible, resilient, and adaptive identity systems that meet complex business requirements while ensuring the highest security standards. Our architectural approaches transform traditional identity management into intelligent, cloud-based systems that accelerate business processes while automatically ensuring regulatory excellence.
IAM automation eliminates manual errors in provisioning and deprovisioning, accelerates onboarding through fully automated Joiner-Mover-Leaver processes, and ensures access rights always comply with the least-privilege principle. ADVISORI implements intelligent IAM automation solutions that seamlessly orchestrate HR systems, Active Directory and enterprise applications.
IAM compliance is the strategic foundation for regulatory excellence and transforms complex compliance requirements into automated, intelligent systems that ensure continuous legal certainty. Our comprehensive compliance solutions enable organizations to meet the highest regulatory standards while simultaneously accelerating business processes and maximizing operational efficiency. By integrating advanced technologies, we create a compliance architecture that proactively responds to regulatory changes and establishes audit readiness as a continuous state.
A well-considered IAM concept is the strategic foundation of every successful identity management initiative and forms the basis for sustainable digital transformation. Our conceptual frameworks connect technical excellence with strategic business objectives and create the foundation for flexible, secure, and future-ready identity architectures that help organizations master complex security requirements while enabling innovation.
IAM consulting is the key to successful digital transformation and forms the strategic foundation for modern enterprise security. Our comprehensive IAM consulting transforms complex identity landscapes into intelligent, adaptive security architectures that accelerate business processes, automate compliance, and simultaneously ensure the highest security standards. As experienced IAM consultants, we accompany you from strategic vision to operational excellence.
IAM Cyber Security combines advanced identity management with intelligent cyber defense mechanisms, creating an adaptive security architecture that proactively protects against advanced persistent threats, insider threats, and zero-day attacks. Our integrated solutions transform traditional IAM systems into intelligent security platforms that continuously learn, adapt, and neutralize threats in real time, while simultaneously ensuring optimal usability and business continuity.
IAM frameworks form the strategic foundation of modern identity management, enabling organisations to orchestrate complex identity landscapes through structured governance architectures. Our enterprise-grade framework solutions transform fragmented identity systems into coherent, flexible architectures that combine the highest security standards with optimal business integration, while ensuring regulatory excellence and long-term strategic viability.
IAM governance forms the strategic foundation for sustainable identity and access management, transforming complex security requirements into structured, measurable, and continuously optimizable governance frameworks. Our comprehensive governance approaches establish solid organizational structures, clear accountabilities, and automated compliance processes that develop your IAM landscape into a strategic competitive advantage while simultaneously meeting the highest regulatory standards.
IAM IT infrastructure forms the technical backbone of successful identity management systems and requires well-considered architecture decisions that optimally balance scalability, performance, and security. We develop high-performance, cloud-based IAM infrastructures using modern DevOps practices, container orchestration, and Infrastructure-as-Code approaches for maximum flexibility and operational efficiency.
Identity & Access Management (IAM) is the foundation of modern enterprise security: it controls who accesses which systems and data � reliably, in compliance, and at scale. ADVISORI guides you from IAM strategy and system selection through to productive implementation � securing digital identities in complex enterprise environments.
IAM implementation is a highly complex transformation process that combines strategic planning, technical excellence, and comprehensive change management to successfully integrate modern Identity & Access Management systems into enterprise environments. Our proven implementation methods ensure smooth transitions, minimal operational disruptions, and maximum user acceptance while simultaneously meeting the highest security and compliance standards.
IAM (Identity & Access Management) is the IT discipline ensuring the right people can access the right resources at the right time � while keeping everyone else out. As the strategic foundation of modern IT security, IAM combines identity management, access control, and compliance into a single coherent framework.
IAM infrastructure forms the technological backbone of modern identity management, enabling organizations to implement flexible, highly available, and performant identity systems that meet current requirements and support future growth. Our infrastructure expertise combines proven architectural principles with effective cloud technologies to deliver an IAM infrastructure that optimally unites security, performance, and usability.
IAM Integration is the strategic link between isolated systems and a coherent, intelligent identity landscape that modern enterprises need for digital transformation and business success. Our advanced integration solutions transform fragmented IT environments into orchestrated ecosystems that maximize security, increase productivity, and simultaneously reduce complexity dramatically. Through API-first architectures, cloud-based approaches, and intelligent automation, we create smooth connections between legacy systems, modern cloud services, and future technologies.
Professional IAM maintenance and support: we ensure the performance, availability and compliance of your Identity & Access Management systems through proactive monitoring, regular security updates and continuous performance tuning.
IAM Management is the operational core of successful identity administration, transforming complex security requirements into efficient, automated processes. Through strategic governance, intelligent lifecycle management, and continuous optimization, we create an IAM landscape that not only meets the highest security standards but also accelerates business processes and maximizes operational efficiency.
IAM Manager platforms are the strategic core of modern identity management: central identity repository, automated provisioning, role-based access control and comprehensive identity governance frameworks � delivering maximum security, compliance and operational efficiency across your enterprise.
Frequently Asked Questions about IAM Security - Identity & Access Management Security
Why is IAM Security the foundation of modern cybersecurity and what strategic challenges must organizations address?
IAM Security forms the critical foundation of every modern cybersecurity strategy, as identities have become the primary target for cybercriminals. Increasing digitalization, remote work, and cloud migration have rendered traditional perimeter-based security models obsolete, requiring a fundamental shift toward identity-centric security architectures.
🎯 Strategic Importance of IAM Security:
🛡 ️ Modern Threat Landscape for Identities:
🔧 Technological Challenges and Complexity:
📊 Organizational and Governance Aspects:
🚀 Forward-Looking Security Strategies:
How does one implement a Zero Trust IAM architecture and what technical and organizational prerequisites are decisive?
Zero Trust IAM architectures transform traditional security models through the fundamental assumption that no user or system is trustworthy by default. This architecture requires continuous verification and authorization for every access request, regardless of network position or prior authentication.
🏗 ️ Architectural Core Principles of Zero Trust IAM:
🔐 Technical Implementation Components:
📋 Strategic Implementation Phases:
🛠 ️ Technology Stack and Integration:
⚖ ️ Organizational Transformation and Change Management:
📊 Monitoring and Compliance Framework:
What role do AI and machine learning play in modern IAM Security systems and how can these technologies enable proactive threat detection?
Artificial intelligence and machine learning transform IAM Security from reactive to proactive security models that can detect and counter threats before they cause damage. These technologies make it possible to analyze complex behavioral patterns and identify anomalies that would be impossible for human analysts to detect.
🧠 AI-Assisted Behavioral Analytics and Anomaly Detection:
🔍 Advanced Threat Detection Capabilities:
🚀 Adaptive Authentication and Dynamic Access Control:
🛡 ️ Automated Response and Orchestration:
📊 Data Analytics and Intelligence Integration:
⚙ ️ Implementation and Operational Considerations:
How does one design Privileged Access Management (PAM) security for modern hybrid and multi-cloud environments and what best practices are essential?
Privileged Access Management security in hybrid and multi-cloud environments requires a fundamental redesign of traditional PAM approaches, as privileged accounts in distributed infrastructures present exponentially more complex risks. Modern PAM strategies must combine cloud-based principles with strong security controls.
🏗 ️ Cloud-based PAM Architecture Design:
🔐 Just-in-Time and Just-Enough-Access Implementation:
🛡 ️ Advanced Session Management and Monitoring:
🔑 Secrets Management and Credential Security:
☁ ️ Multi-Cloud and Hybrid Integration Strategies:
📊 Compliance and Governance Framework:
🚨 Incident Response and Threat Mitigation:
How does one develop an effective IAM threat detection strategy and which technologies are decisive for the early detection of identity threats?
An effective IAM threat detection strategy requires a multi-layered approach that combines traditional signature-based detection with modern behavior-based analytics. The challenge lies in distinguishing legitimate user activities from potentially malicious behaviors without impacting productivity.
🔍 Behavioral Analytics and Baseline Establishment:
🚨 Advanced Threat Detection Capabilities:
🧠 Machine Learning and AI Integration:
📊 Data Sources and Integration:
⚡ Real-Time Processing and Response:
🔧 Implementation and Operational Excellence:
What best practices apply to IAM incident response and how can organizations optimally prepare for identity-related security incidents?
IAM incident response requires specialized procedures and tools, as identity-related security incidents can often have complex impacts on the entire IT infrastructure. Effective preparation and structured response processes are critical for minimizing damage and rapidly restoring security.
📋 Incident Response Planning and Preparation:
🚨 Incident Classification and Prioritization:
🔍 Investigation and Forensic Analysis:
⚡ Containment and Eradication Strategies:
🔄 Recovery and Restoration Procedures:
📊 Post-Incident Analysis and Lessons Learned:
🛠 ️ Tools and Automation for Incident Response:
How does one implement adaptive authentication systems and which factors should be considered in dynamic risk assessment?
Adaptive authentication systems transform user authentication through dynamic adjustment of security requirements based on real-time risk assessments. These systems make it possible to optimally balance security and usability by only requiring additional authentication steps when risk is elevated.
🎯 Risk Assessment Framework and Scoring:
🌍 Contextual Factors and Environmental Intelligence:
🔐 Authentication Factor Selection and Orchestration:
📱 User Experience Optimization:
🧠 Machine Learning and Predictive Analytics:
⚙ ️ Technical Implementation and Integration:
📊 Monitoring and Continuous Improvement:
What strategies exist for the secure integration of IAM Security into DevOps and CI/CD pipelines and how can security-by-design be implemented?
Integrating IAM Security into DevOps and CI/CD pipelines requires a fundamental shift from traditional security approaches toward security-by-design principles. This integration makes it possible to establish security as an integral part of the development process rather than treating it as a downstream activity.
🔧 DevSecOps Integration and Pipeline Security:
🏗 ️ Security-by-Design Architecture Principles:
🔐 Identity-Centric Security in Development:
🚀 Automation and Orchestration:
📊 Monitoring and Observability:
🛡 ️ Vulnerability Management and Threat Modeling:
🔄 Continuous Compliance and Governance:
🎓 Training and Culture Transformation:
How does one ensure IAM Security compliance for DORA, NIS2, and GDPR and what specific requirements must be fulfilled?
IAM Security compliance for modern regulatory frameworks such as DORA, NIS2, and GDPR requires a comprehensive approach that combines technical security measures with strong governance structures and continuous monitoring processes. These regulations place specific requirements on identity management that go beyond traditional security controls.
📋 DORA Compliance for IAM Security:
🛡 ️ NIS 2 Directive Requirements for Identity Security:
🔐 GDPR Privacy-by-Design for IAM Systems:
⚖ ️ Cross-Regulatory Compliance Framework:
📊 Documentation and Evidence Management:
What strategies exist for implementing privacy-by-design in IAM Security systems and how can data protection and security be optimally balanced?
Privacy-by-design in IAM Security systems requires a fundamental integration of data protection principles into all aspects of identity management. This approach ensures that data protection is treated not as an afterthought but as an integral part of the security architecture.
🏗 ️ Architectural Privacy Principles:
🔐 Technical Privacy Controls:
📊 Data Lifecycle Management:
🛡 ️ Access Control and Authorization:
⚙ ️ Privacy Engineering Practices:
🔄 Governance and Compliance:
How does one develop a strong IAM Security governance structure and what roles and responsibilities are decisive?
A strong IAM Security governance structure forms the foundation for effective identity security and ensures that all aspects of IAM security are strategically planned, systematically implemented, and continuously monitored. This structure must establish clear responsibilities, decision-making processes, and control mechanisms.
🏛 ️ Governance Framework and Organizational Structure:
👥 Definition of Roles and Responsibilities:
📋 Policy and Standards Management:
🔍 Risk Management and Assessment:
📊 Performance Management and Metrics:
🔄 Change Management and Communication:
What challenges exist in IAM Security for multi-cloud and hybrid environments and how can they be successfully addressed?
IAM Security in multi-cloud and hybrid environments presents unique challenges that can overwhelm traditional security approaches. The complexity of different cloud providers, varying security models, and distributed infrastructures requires effective solution approaches and specialized expertise.
☁ ️ Multi-Cloud Identity Challenges:
🔗 Hybrid Infrastructure Complexity:
🛡 ️ Security Architecture Strategies:
🔐 Technical Implementation Approaches:
📊 Monitoring and Visibility:
⚙ ️ Operational Excellence:
🎯 Strategic Considerations:
How does one implement passwordless authentication in IAM Security systems and which technologies are forward-looking?
Passwordless authentication transforms IAM Security by eliminating the weakest link in the authentication chain — the password. This technology offers not only enhanced security but also improved user experience and reduced operational costs for password management.
🔐 Passwordless Authentication Technologies:
📱 Implementation Strategies and User Experience:
🛡 ️ Security Architecture and Cryptographic Foundations:
⚙ ️ Enterprise Integration and Management:
📊 Operational Benefits and ROI:
🔄 Migration Planning and Change Management:
🚀 Future Technologies and Innovation:
What role does blockchain technology play in modern IAM Security systems and how can it be used for decentralized identity management?
Blockchain technology offers far-reaching possibilities for IAM Security through the creation of trust-free, decentralized identity systems. This technology enables users to retain full control over their digital identities while simultaneously ensuring the highest security and data protection standards.
🔗 Blockchain-Based Identity Foundations:
🛡 ️ Security Benefits and Trust Models:
🔐 Technical Implementation Approaches:
2 solutions for flexible and cost-efficient transactions
📱 User Experience and Wallet Management:
⚖ ️ Regulatory Compliance and Legal Frameworks:
🌐 Enterprise Integration Strategies:
🔄 Operational Considerations:
How can quantum computing affect IAM Security and what preparations are required for quantum-resistant authentication?
Quantum computing poses a fundamental threat to the current cryptographic foundations of IAM Security, while simultaneously requiring effective approaches for future-proof authentication. Preparing for the post-quantum era is critical for the long-term security of identity systems.
⚛ ️ Quantum Threat Landscape for IAM:
🔐 Post-Quantum Cryptography Standards:
🛡 ️ Quantum-Safe IAM Architecture:
📊 Risk Assessment and Migration Planning:
⚙ ️ Implementation Strategies:
🔄 Operational Transformation:
🚀 Quantum Opportunities for IAM:
What advanced monitoring and analytics techniques are decisive for IAM Security operations and how does one implement them effectively?
Advanced monitoring and analytics are the nervous system of modern IAM Security operations, enabling proactive threat detection, continuous risk assessment, and data-driven security decisions. These techniques transform reactive security approaches into preventive, intelligent defense strategies.
📊 Advanced Analytics Frameworks:
🔍 Behavioral Analytics and User Profiling:
🚨 Threat Intelligence Integration:
⚡ Real-Time Monitoring and Alerting:
🔧 Technical Implementation Architecture:
📈 Performance Metrics and KPIs:
🎯 Operational Excellence:
🔄 Integration and Orchestration:
What strategic considerations are decisive when selecting and implementing IAM Security solutions for enterprise environments?
The strategic selection and implementation of IAM Security solutions in enterprise environments requires a comprehensive consideration of business requirements, technical capabilities, and long-term objectives. These decisions have far-reaching implications for security, productivity, and operational efficiency across the entire organization.
🎯 Strategic Business Alignment:
🏗 ️ Architecture and Technology Evaluation:
🔐 Security and Compliance Considerations:
⚙ ️ Implementation Strategy and Roadmap:
🔄 Operational Excellence Planning:
💰 Financial and Resource Planning:
🚀 Innovation and Future-Proofing:
How can IAM Security maturity be measured and continuously improved in organizations?
IAM Security maturity measurement is a systematic approach to assessing and improving the identity security of an organization. This assessment makes it possible to identify strengths, uncover weaknesses, and develop targeted improvement measures.
📊 Maturity Assessment Framework:
🔍 Key Performance Indicators and Metrics:
🎯 Maturity Dimensions and Assessment Areas:
📈 Continuous Improvement Methodology:
🔧 Implementation and Execution:
📋 Assessment Tools and Methodologies:
🔄 Feedback Loops and Optimization:
🎖 ️ Recognition and Incentivization:
What best practices apply to IAM Security training and awareness programs and how can a security-conscious culture be created?
IAM Security training and awareness programs are critical for creating a security-conscious culture, as people are often the weakest link in the security chain. Effective programs transform users from potential security risks into active defenders of organizational security.
🎓 Comprehensive Training Strategy:
🔐 Security Awareness Content Development:
📱 Engaging Delivery Methods:
🎯 Targeted Audience Segmentation:
📊 Effectiveness Measurement and Assessment:
🔄 Cultural Transformation Strategies:
🚀 Innovation and Engagement:
🎖 ️ Sustainability and Long-Term Success:
How does one design a future-proof IAM Security roadmap and which trends should be considered?
A future-proof IAM Security roadmap requires strategic foresight, technological innovation, and adaptive planning. This roadmap must both fulfill current security requirements and be prepared for future challenges and opportunities.
🔮 Future Technology Trends and Innovation:
🌐 Digital Transformation Alignment:
🔐 Emerging Security Paradigms:
📊 Strategic Planning Framework:
🎯 Implementation Phases and Milestones:
⚖ ️ Regulatory and Compliance Evolution:
🔄 Agile Roadmap Management:
🚀 Innovation and Experimentation:
🎖 ️ Success Factors and Enablers:
Latest Insights on IAM Security - Identity & Access Management Security
Discover our latest articles, expert knowledge and practical guides about IAM Security - Identity & Access Management Security

EU AI Act Enforcement: How Brussels Will Audit and Penalize AI Providers — and What This Means for Your Company
On March 12, 2026, the EU Commission published a draft implementing regulation that describes for the first time in concrete detail how GPAI model providers will be audited and penalized. What this means for companies using ChatGPT, Gemini, or other AI models.

NIS2 and DORA Are Now in Force: What SOC Teams Must Change Immediately
NIS2 and DORA apply without grace period. 3 SOC areas that must change immediately: Architecture, Workflows, Metrics. 5-point checklist for SOC teams.

Control Shadow AI Instead of Banning It: How an AI Governance Framework Really Protects
Shadow AI is the biggest blind spot in IT governance in 2026. This article explains why bans don't work, which three risks are really dangerous, and how an AI Governance Framework actually protects you — without disempowering your employees.

EU AI Act in the Financial Sector: Anchoring AI in the Existing ICS – Instead of Building a Parallel World
The EU AI Act is less of a radical break for banks than an AI-specific extension of the existing internal control system (ICS). Instead of building new parallel structures, the focus is on cleanly integrating high-risk AI applications into governance, risk management, controls, and documentation.

The AI-supported vCISO: How companies close governance gaps in a structured manner
NIS-2 obliges companies to provide verifiable information security. The AI-supported vCISO offers a structured path: A 10-module framework covers all relevant governance areas - from asset management to awareness.

DORA Information Register 2026: BaFin reporting deadline is running - What financial companies have to do now
The BaFin reporting period for the DORA information register runs from 9th to 30th. March 2026. 600+ ICT incidents in 12 months show: The supervisory authority is serious. What to do now.
Success Stories
Discover how we support companies in their digital transformation
Digitalization in Steel Trading
Klöckner & Co
Digital Transformation in Steel Trading

Results
AI-Powered Manufacturing Optimization
Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Results
AI Automation in Production
Festo
Intelligent Networking for Future-Proof Production Systems

Results
Generative AI in Manufacturing
Bosch
AI Process Optimization for Improved Production Efficiency

Results
Let's
Work Together!
Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Your strategic success starts here
Our clients trust our expertise in digital transformation, compliance, and risk management
Ready for the next step?
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
For optimal preparation of your strategy session:
Prefer direct contact?
Direct hotline for decision-makers
Strategic inquiries via email
Detailed Project Inquiry
For complex inquiries or if you want to provide specific information in advance