CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

Dean Weich

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management

The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be implemented fairly quickly, and 3) Companies have realized the great benefits IAM solutions bring to their organization.

As the IAM market continues to grow, the solutions have become more advanced to meet the changing needs of the many different organizations and the unique challenges that they face. These solutions are not just basic account creation and password management anymore. They have evolved to handle the various types of employees and industries and still continue to progress and grow.

Let’s take a look at some of the newer advancements made in the IAM market that were created to meet the needs of these industries. The following are two advancements that came directly from trends in the market.

Password management for remote employees

One newer trend is employees working remotely. Users don’t always work in the office or on the company’s network. Though they are not in the office, they encounter similar, but somewhat different, issues as employees in the office. One newer solution to a specific problem has been to make the login process for remote workers more efficient and easy. Think of an employee who is quickly trying to gain access on their smartphone or tablet. To open each application in a new tab and enter credentials is an extremely time-consuming process.

A solution that was developed to easily mitigate this issue is cloud-based single sign-on solutions. Users can easily access a portal where all applications they are authorized to access are available. They simply provide a single set of credentials for authentication and can then access their applications by simply clicking on the icon. This allows them to access their applications from anywhere that they are working, whether inside or outside of the company’s network from one place.

This is also extremely convenient for users who are using mobile devices. Many vendors offer the ability for users to download an app on their device. The app will prompt the user to enter a single set of credentials to get to the portal where they can access their applications. For users who are on the go, and use tablets or smartphones, this can be of tremendous benefit. They can access what they need, from anywhere, at any time, without having the inconvenience of authenticating to multiple applications.

While this type of solution is very convenient for remote employees, it is also helpful for many different industries. For example, in education, where students complete a large majority of their work outside of the school’s network and often use many mobile devices.

Security of access rights

Another trend and growing requirement of organizations in the last couple of years is ensuring security when it comes to access rights in the network. While security has always been a top concern, there has been an increased need to ensure the network is secure from the inside and that employees cannot access system and applications with sensitive data unless their job requires it.

 

This can be achieved with access governance solutions that have become more available in recent years. Access governance ensures that each employee within the organization have the correct access rights to the exact resources that they need. This is important for many reasons including for employees to efficiently perform their jobs and to keep the company’s network secure.

The company first needs to set up a model of exactly which access rights each role in the organization should have. For example, someone working as a manager in the IT department will need certain access rights to systems, applications and resources. By utilizing access governance, it can be ensured that when the account is created it is done so without accidentally making any access mistakes; either giving the employee too many rights or too few rights. This ensures that the employee receives exactly the correct rights that they need and in a timely manner.

Additional methods and modules have also been developed to further mitigate any security issues of access rights.

Reconciliation is another way to ensure absolutely correct access rights. This module compares how access rights are set up to be in the model to how they actually are and creates a report on any differences. Anything that is not accurate can then be easily corrected.

Attestation is another form of checking access and goes one step further — regular verification that everything is correct. A report is sent out to managers of a department showing their employees and their access rights requiring them to verify accuracy. For example, the marketing manager will receive a report on the access rights of everyone in the marketing department. He or she will need to review and either mark access rights for deletion, change access right directly or create a ticket in the helpdesk system to change the access right. After looking everything over the manager must give his or her final approval for the proposed set of changes to ensure that everything is correct.

These are some of the newer trends in IAM that vendors have developed to meet changing needs of organizations. But what about other trends in IAM? Will the industry continue to grow?

Of course; as trends develop so do problems and solutions in the identity and access management space. For example, for remote workers there are still issues that an IAM solution would resolve. Working in the cloud and remotely brings about unique challenges for account and password management since they are occurring outside of the company’s network. As trends change and develop, the IAM marketing will continue to transform to meet the needs of different employees and industries that utilize the solutions.

By Dean Wiech

Dean Wiech

Dean Wiech is managing director at Tools4ever US. Tools4ever supplies a variety of software products and integrated consultancy services involving identity management, such as user provisioning, role-based access control, password management, single sign on and access management solutions.

View Website
The Lighter Side Of The Cloud - Due Diligence
The Lighter Side Of The Cloud - Self Education
The Lighter Side Of The Cloud - Brain Clutter
The Lighter Side Of The Cloud - Mother Always Said
The Lighter Side Of The Cloud: Intelligence
Chris

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...
Istio 1.0: Making It Easier To Develop and Deploy Microservices

Istio 1.0: Making It Easier To Develop and Deploy Microservices

With the recent availability of Istio 1.0 it is not surprising that it continues to capture much attention from the ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
State of the Cloud Report

State of the Cloud Report

Cloud Report As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the Cloud ...
How artificial intelligence and analytics helps in crime prevention

How artificial intelligence and analytics helps in crime prevention

How Artificial Intelligence Helps Crime Prevention According to a study released by FBI, there is an annual increase of 4.1% ...
Want to dip your toe into the cloud? Challenges of a Large Migration

Want to dip your toe into the cloud? Challenges of a Large Migration

Challenges of a Large Migration Migrating to the cloud can be a daunting task. First you have to go through ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
Technology Certification Courses

Top Five Technology Certification Courses To Choose From In 2018

Technology Certification Courses Gartner predicts that the global public cloud services market is projected to grow by 55 percent in the next three years and is expected to reach $383.3 billion by the end of 2020. Today, cloud computing helps enterprises ...
The Developer’s Guide to Azure

The Developer’s Guide to Azure

Develop on a cloud platform designed for you. In this update of the Developer’s Guide to Azure, see how the comprehensive set of Azure app platform services fits your needs. Use it to navigate the architectural approaches and most common ...
DevOps

DevOps

FIRST THINGS FIRST. WHAT ARE MICROSERVICES? Microservices are an engineering approach and architectural style of computing that is becoming extremely important for organizations wanting to innovate through a stronger engagement with their ecosystem of customers, suppliers and partners. To explain ...
Top 50 Cloud Hosting Services

Top 50 Cloud Hosting Services

The methodology behind our top 50 cloud list is based on several years of experience understanding and following who the key players are in the industry. Click to review the current top 50 and stay tuned for future discussion ...
How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a choice as to who to work with, but do you know what will help tip the scales in your favor? ...
Leading Programming Languages - TIOBE Index for July 2018

Leading Programming Languages – TIOBE Index for July 2018

Last month we announced that TypeScript entered the TIOBE index top 100 for the first time. TypeScript appears to keep growing in popularity. This month it entered the top 50. TypeScript is slowly becoming the new and improved JavaScript. One ...