Identity and access management

Fri
11
Mar

Identity and Access Management - Could it be ever ignored?

It is amazing to see that most of the big organizations in the world of technology and business have a humble beginning. Handful of people as founders, a garage as the office and shoestring budget to take care of the basic operations; such has been the beginning for many top organizations. In case of small organization, management of resources is easy and comfortable.

For instance, managing the payroll of a small enterprise is easy and can be done by a single person with a basic tool. Providing the small number of employee access to the company’s portal is not cumbersome too. A person gets transferred from Sales to Marketing. Changing this person’s privilege in the small company’s management system won’t be tough one.

Wed
13
Jan

Identity and Access Management - Data Synchronization

Identity and Access Management - Data Synchronization

Organizations are currently in need of systems where they can assure their users of real time updating and effective immediately options. For example, when a mobile customer performs a transaction, he expects it to be reflected immediately such as mobile recharge, bill payment, updation of personal details etc. This has become a major factor in various companies maintaining their user base improve and maintain them intact.

For this to be implemented organizations must have seamless connectivity and consistent data availability across all their systems. The main objective of Data Synchronization is to establish consistency among various systems and provide continuous updates to maintain unique data. This is a complicated task to implement.

The major roadblocks in achieving data synchronization are as follows:

Mon
11
Jan

IAM Testing - Plan well to reap benefits

IAM Testing - Plan well to reap benefits

Every organization wants to be there into the Leader’s Quadrant; Having an Identity and Access Management solution that suits their business needs and reach to global partner’s  aid’s their push. In an organization, Identity and Access Management (IAM) is a critical application for managing a company’s interactions with current and future customers. Traditional IAM services were built for an organization’s internal use, and controlling access to data and systems behind the firewall. As the organizations are looking to expand the engagement with global customers, the number of people, devices and method’s that require access to sensitive information are growing rapidly. Organizations can support this change by evolving their IAM systems, which will help build value for these companies by providing efficient and secure customer as well as partner-facing services globally.

Mon
11
Jan

Challenges and Possible Solution to Eliminate Embedded Passwords in Application

Challenges and Possible Solution to Eliminate Embedded Passwords in Application

Effective password policy is needed to prevent the passwords from being guessed or cracked. The password policy applies to passwords of various types of user accounts, system accounts, database accounts, application service accounts, etc., while the password policy can be relatively easily enforced for human user accounts, it is difficult to enforce for the passwords used in application to application communication. This article talks about the challenges and possible solution to eliminate embedded passwords in application.

Tue
06
Oct

Redefining IAM Program for Digital Business

Redefining IAM Program for Digital Business

It seems like with the emergence of newer technologies, IoT and need to manage external identities, there is a great necessity for restructuring or redefining the existing IAM program of enterprises.

I recently, came across an analyst report "Innovate Your IAM Program to Propel Digital Business" by Ant Allan and Felix Gaehtgens. The report talks on the aspect of keeping aside the legacy approaches and seeking new approaches that enable Identity and Access Management to propel rather than inhibit digital business.

Wed
26
Aug

Pages

Subscribe to RSS - Identity and access management