Identity and Access Management Alleviating End-user Identity CrisisThe globalized business environment today being aggress...
·    User Management- refers to management and regulation of identity creation, password re-          setting, transmissio...
Upcoming SlideShare
Loading in …5
×

Identity and Access Management Alleviating End-user Identity Crisis

238 views

Published on

The globalized business environment today being aggressively competitive makes use of every technological innovation to increase the accessibility of data and information to the customers, partners, vendors and suppliers.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
238
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Identity and Access Management Alleviating End-user Identity Crisis

  1. 1. Identity and Access Management Alleviating End-user Identity CrisisThe globalized business environment today being aggressively competitive makes use of everytechnological innovation to increase the accessibility of data and information to the customers, partners,vendors and suppliers. However, in the process of meeting up to the demands of the various entities, theorganizations tend to use a number of applications, various security models and identity systems whichmay not always be compatible. This leads to inefficiencies in the corporate network which further leads todata and identity thefts and unauthorized access to business critical data.With security measures such as password based entry been deployed in the access points to corporatenetwork, the need for frequent changes in the password leads to multiple repositories of user-ids withmultiple passwords. Juggling through this password puzzle leads to confusion for the end-user and benefitfor the cyber criminal. To keep such situations at bay, organizations need to make use of effective identityand access management systems that would provide a comprehensive and focused approach to securityissues of the corporate network end-users and will also ensure compliance and efficiency in securing thevital business information.Further, the growing demands on information technology has led to global organizations to depend on IToutsourcing of data center operations, desktop and help desk support, software applicationsdevelopment, network operations and disaster recovery. However, though this helps the organization infulfilling the IT needs of the customers; it also leaves open a wide scope for cyber attacks and misuse ofcritical data.Identity and Access management can thus be defined as a set of policies, processes, and technologiesused for creation, and management of digital identities. With the objective to provide right access to theright people at the right time, efficient identity and access management solutions will help organizationsmanage access to the information and applications within the organizational network withoutcompromising security. The solution refers to the process of creating, propagating, and maintaining useridentity and privileges and comprises of four main modules: · Authentication- verification and proving the identity for gaining access to an application system or resource. · Authorization- determination and confirmation of an identity and allowing access to a system or resource to perform some action.
  2. 2. · User Management- refers to management and regulation of identity creation, password re- setting, transmission of information and various others, from the creation digital entity to its termination · Enterprise Directory- refers to the repository used for storing the digital identities, credentials and attributes for reference. With information security being the major cause of concern for most of the techno savvy organizations, use of identity and access management system will help organizations to authorize administration within an organization which will facilitate in recognizing any entry without permission. Hence, it provides complete security to an organization, protects both confidential and personal data and helps organization achieve operational efficiency.Related Links: Service desk, Green datacenter

×