Identity and Access MgmtRSS

Identity and Access Management is a simple topic, with very complicated answers,  It asks two key questions; Who are you, and what can you access?   To describe this in very basic terms, it is the practice of managing users' electronic identities and the methods by which they can access various resources.

 

As these products have matured and grown, they have extended the core platforms and services to offer stronger forms of authentication, authorization based on risk, and more detailed access definitions.  User provisioning based on roles and relationships has become critical, as well as the ability to virtualize identities.

 

Products that perform Identity and Access Management typically function in four areas; directory services, identity administration, access management, and audit.

 

Directory services are the key building blocks for most identity management platforms. The source of the data, the distribution of that data into the directories that require it, and who holds authority for maintaining the data in the directory are all aspects that must be managed carefully.

 

Identity administration can include user and group management, delegated administration, and approval workflows. Not only should it automate the process of forming, deleting or changing a user identity and associated privileges, there may also be a need for a user to delegate certain of their responsibilities to others in an automated fashion.

 

Access management allows IT professionals to control user access to enterprise resources. While identity administration manages the user identity data, access management is the guard at the door that determines which users may access what information.

 

Audit both related administrative and access activities. Organizations require the ability to demonstrate that account administration and access controls are performing according to policy.

 

Be sure to pilot the processes, not just the technology. Many organizations that have begun identity-management efforts say that business-process issues present bigger hurdles than the technology.  Document, document, document.  In the process of giving access to your resources to individuals, there can be no room for things to fall through the cracks.  Not giving someone all the resources they need to do their job is just plain irritating.  Removing an exiting employee from everywhere but (insert critical component here) could be disastrous.

 

Finally, watch out for industry consolidation.  As the security product space compresses and big names buy the little ones to get into the market or expand their portfolio or improve their technology or even blatantly squash competition, the product you buy today from the "other company" could be part of "the big company" before you know it.

 

Other Information about Identity and Access Management

Cyber-Ark Software Ltd
Commercial
Pricing Model

Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, full life-cycle solution for securing, managing, automatically changing and monitoring all activities associated with privileged accounts. This includes the Root account on UN ...

Modified
Privileged Identity Management (PIM) Suite
Commercial
Pricing Model

DirX Audit provides a platform for the central collection, normalization, storage, and analysis of audit trails from different audit sources. Auditors can use DirX Audit's web-based user interface to analyze and correlate the audit logs in the central ...

Modified
Commercial
Pricing Model

DirX Directory enables the secure storage of unambiguous digital identities and is designed to handle a potentially very large number of users. Other data, such as the public keys for a public key infrastructure, can also be stored and managed reliably ...

Modified
Commercial
Pricing Model

DirX Access is a comprehensive access management and identity federation solution for protecting Web services and Web applications against unauthorized access. User access is controlled and enforced on the basis of central role-based security policies ...

Modified
DBAPPSecurity
Commercial
Pricing Model

DBAPPSecurity Log Auditor can monitor and collect various information from the target information system (e.g.: Firewall, VPN, intrusion detection, intrusion protection, anti-virus systems, database and applications) to audit information security.

Modified
Commercial
Pricing Model

Oracle Directory Services Plus is the only integrated solution that provides a comprehensive set of directory solutions for high performance enterprises and carrier-grade environments. Oracle Directory Services Plus is a single package comprising of: ...

ModifiedNever
Commercial
Pricing Model

* Faster deployments—An integrated suite approach enables faster deployments and streamlined day-to-day operations * Improved security—Proven, best-in-class solutions work together as a single solution by abstracting and centralizing security for app ...

ModifiedNever
Oracle
Commercial
Pricing Model

Oracle Access Manager allows users of your applications or IT systems to log in once and gain access to a broad range of IT resources. Oracle Access Manager provides an identity management and access control system that is shared by all your applications. ...

ModifiedNever
Commercial
Pricing Model

Oracle Identity Federation 11g provides a self-contained and flexible multi-protocol federation server that can be rapidly deployed with your existing identity and access management systems. With its support for leading standards-based protocols, it ensur ...

ModifiedNever
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Password Manager (formerly P-Synch) is an enterprise solution for managing passwords and other authentication factors. It improves the security of passwords and related IT support processes, reduces the cost of user support and improves ...

Modified
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Identity Manager is a complete identity management solution that automates and simplifies the tasks of managing users and entitlements across multiple systems and applications throughout the user lifecycle. Organizations depend on Identi ...

Modified
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications. Random passwords are encrypted and store ...

Modified
Hitachi ID Privileged Access Manager
Hitachi ID Systems, Inc.
Commercial
Pricing Model

Hitachi ID Group Manager is a self-service group management solution. It allows users to request access to resources such as shares and folders, rather than requesting access to groups. Group Manager automatically maps requests to the appropriate ...

Modified
Hitachi ID Group Manager
Swivel Secure Ltd

PINsafe from Swivel Secure allows tokenless two factor and strong authentication without the expense and hassle of carrying around tokens maing it suitable for large scale and corporate through to small deployments. Using a simple PIN extraction proc ...

Modified
PINsafe
Tools4ever, Inc.

UMRA is a complete User Management System that simplifies Active Directory Management across all your systems. While managing user account and authorization processes in Active Directory and adjacent systems, UMRA also offers delegation of user account ma ...

Modified
UMRA
Watchful Software
Commercial
Pricing Model

TypeWATCH is an eBiometrics solution that needs no hardware, yet continuously monitors for identity data theft attempts, by analyzing free text typing patterns of each user. It provides continuous security post-login (inside the perimeter) and secures th ...

Modified
Service
Pricing Model

Stormpath is a User Management API that reduces development time with instant-on, scalable user infrastructure. Stormpath's intuitive API and expert support make it easy for developers to authenticate, manage and secure users and roles in any application. ...

Modified
Stormpath User Management and Authentication
Commercial
Pricing Model

PixelPin is a B2B2C solution which replaces passwords with pictures. Users choose a picture and click on it in 4 places in sequence to sign in. Key benefits of PixelPin's picture password Simple, quick & easy to use across all platforms On mobile d ...

Modified
Commercial
Pricing Model

Adaptive Authentication monitors and authenticates online activities in real time by correlating behavioral analysis, device profiling, and data feeds from RSA eFraudNetwork. AT A GLANCE Measures risk of login and post login activities by evaluating o ...

Modified
RSA Adaptive Authentication
EMC Corporation
Commercial
Pricing Model

RSA Access Management: Access-management software that enables seamless and secure access to information anywhere and anytime. With simplified access management, businesses can connect users to information simply, securely, and efficiently. Secure Access ...

Modified
RSA Access Management

© Computer Network Defence Limited 2021