Identity and Access MgmtRSS

Identity and Access Management is a simple topic, with very complicated answers,  It asks two key questions; Who are you, and what can you access?   To describe this in very basic terms, it is the practice of managing users' electronic identities and the methods by which they can access various resources.

 

As these products have matured and grown, they have extended the core platforms and services to offer stronger forms of authentication, authorization based on risk, and more detailed access definitions.  User provisioning based on roles and relationships has become critical, as well as the ability to virtualize identities.

 

Products that perform Identity and Access Management typically function in four areas; directory services, identity administration, access management, and audit.

 

Directory services are the key building blocks for most identity management platforms. The source of the data, the distribution of that data into the directories that require it, and who holds authority for maintaining the data in the directory are all aspects that must be managed carefully.

 

Identity administration can include user and group management, delegated administration, and approval workflows. Not only should it automate the process of forming, deleting or changing a user identity and associated privileges, there may also be a need for a user to delegate certain of their responsibilities to others in an automated fashion.

 

Access management allows IT professionals to control user access to enterprise resources. While identity administration manages the user identity data, access management is the guard at the door that determines which users may access what information.

 

Audit both related administrative and access activities. Organizations require the ability to demonstrate that account administration and access controls are performing according to policy.

 

Be sure to pilot the processes, not just the technology. Many organizations that have begun identity-management efforts say that business-process issues present bigger hurdles than the technology.  Document, document, document.  In the process of giving access to your resources to individuals, there can be no room for things to fall through the cracks.  Not giving someone all the resources they need to do their job is just plain irritating.  Removing an exiting employee from everywhere but (insert critical component here) could be disastrous.

 

Finally, watch out for industry consolidation.  As the security product space compresses and big names buy the little ones to get into the market or expand their portfolio or improve their technology or even blatantly squash competition, the product you buy today from the "other company" could be part of "the big company" before you know it.

 

Other Information about Identity and Access Management

EmpowerID

An automated and centralized identity management platform is the only viable means for delivering consistent service and maintaining control over application security. As the only Identity Lifecycle Management solution built on a platform that incorporate ...

VendorThe Dot Net Factory
Pricing ModelCommercial
Modified
VendorMicrosoft
Pricing ModelCommercial
Modified
CA Access Control

What is CA Access Control? It is a product for businesses that need to control and monitor access to a diverse set of server based resources. Fine-grained entitlements allow you to limit user privileges, including those of superusers, to only those nec ...

VendorComputer Associates
Pricing ModelCommercial
Modified
CA Identity Manager

What is CA Identity Manager? As users enter or leave your organization, or when customers and business partners need to interact with your IT systems, CA Identity Manager ensures they have the appropriate levels of access granted to, or removed from, a ...

VendorComputer Associates
Pricing ModelCommercial
Modified
CA Role & Compliance Manager

What is CA Role & Compliance Manager? It is an identity and access management product, founded on advanced pattern recognition technology, that enables you to quickly and accurately develop, maintain and analyze role models. It also provides centra ...

VendorComputer Associates
Pricing ModelCommercial
Modified

DirX Identity offers an extensive identity management solution for enterprises and organizations. It gives the right people the right access to the right resources at the right time and thus leads to productivity, information security, a perceptible reduc ...

VendorSiemens AG
Pricing ModelCommercial
Modified
nmi-edit

The primary goal of the NMI-EDIT Consortium, part of the NSF Middleware Initiative (NMI), is to improve the productivity of the research and education community through development, testing, and dissemination of architectures, software, and practices ...

VendorNMI (NSF Middleware Initiative)
Pricing ModelOpen Source
Modified

IBM Tivoli Access Manager for e-business is a hub for authentication and authorization for Web and other applications, centralizes security management and makes it easy and more cost effective to deploy secure applications. Enables flexible SSO to ...

VendorIBM
Pricing ModelCommercial
Modified

Easily automate lifecycle management of user roles, identities and access rights This user provisioning and role management software is a secure, automated and policy-based solution for managing user roles, identities and access rights that span hetero ...

VendorIBM
Pricing ModelCommercial
Modified

Oracle OpenSSO is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application. Oracle OpenSSO is optimized for both, internal Web access management and extranet authen ...

VendorOracle
Pricing ModelOpen Source
Modified

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

VendorOracle
Pricing ModelFreeware
Modified

Oracle Identity Analytics provides intelligence with rich identity analytics, dashboards, and advanced compliance features, that monitor, analyze, review, and govern user access to mitigate risk, build transparency and satisfy compliance mandates. Oracle ...

VendorOracle
Pricing ModelCommercial
Modified

Oracle Identity Manager is the next-generation role and user administration solution that automates the process of adding, updating, and deleting both user accounts and attribute-level entitlements across enterprise resources. With Oracle Identity Manager ...

VendorOracle
Pricing ModelCommercial
Modified

Improve operational efficiency with Identity-Aware Business Service Management Give users control of identity service requests and apply rigor to identity related business processes with integrated identity and service management This product provide ...

VendorBMC Software
Pricing ModelCommercial
Modified
Courion's Access Assurance Suite

Courion Access Assurance Products Courion's access assurance solutions automate business processes and simultaneously drive down cost, increase security, and enhance service quality for our customers. Courion's Access Assurance Suite, formerly known as ...

VendorCourion Corporation
Pricing ModelCommercial
Modified
CA Federation Manager

What is CA Federation Manager? CA Federation Manager provides standards-based identity federation capabilities that enable the users of one organization to easily and securely access the data and applications of another. What security challenges does ...

VendorComputer Associates
Pricing ModelCommercial
Modified
Ca Single Sign-On

What is CA Single Sign-On? It is a product that consolidates application access into a single login while providing a superior level of application security. The result is increased employee productivity, improved responsiveness to customers, reduced hel ...

VendorComputer Associates
Pricing ModelCommercial
Modified
CA SiteMinder

What is CA SiteMinder? It is a centralized Web access management system that enables user authentication and single sign-on, authentication management, policy-based authorization, identity federation and auditing of access to Web applications and porta ...

VendorComputer Associates
Pricing ModelCommercial
Modified

This initiative will allow developers worldwide to participate in the progress of AccesStream's innovative enterprise identity access management solution. The goal of the AccesStream project is to deliver an enterprise class solution offering authen ...

VendorAccesStream
Pricing ModelOpen Source
Modified
BlueVault Enterprise Security

Through integration with Microsoft Sharepoint, ILM 2K7 and SQL Server, BlueVault Enterprise Security provides low-cost, central solutions assuring compliance to corporate standards while delegating administration of internal and external facing ...

VendorBlue Chip Consulting Group LLC
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019