Advisory Note: From Identity and Access Solutions to Access Governance - 70318

Report Details

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations have not realised the benefits expected from the application of this technology, because they have taken a technology led approach rather than one based on governance. In addition – the move to outsourcing and the Cloud means that technology and some processes are no longer under direct control.

While management implements technology and executes processes, governance sets the policies, procedures, practices and organizational structures that ensure the execution of strategic goals. Identity and access governance sets the framework within which identity and access technology and processes are implemented. By shifting the focus to control rather than execution, governance is also the ideal approach to manage identity and access in an outsourced environment like the Cloud.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Sep 22, 2011

Advisory Note: From Identity and Access Solutions to Access Governance - 70318

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations…

€295.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Advisory Note

Advisory Note: Redefining Access Governance - Beyond annual recertification - 72579

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think…

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Executive View

Executive View: Protected Networks 8MAN - 71520

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende…

Executive View

Executive View: EmpowerID Office 365 Manager - 71322

EmpowerID Office 365 Manager is an Identity and Access Management solution for Office 365 providing single sign-on, user provisioning and administration, and access governance functions in a single integrated package.

Executive View

Executive View: Atos DirX Identity V8.5 - 70896

Atos DirX Identity encompasses a rich feature set for all areas of Identity Management and Governance. Its comprehensive business and process-driven approach includes very strong modelling capabilities of the organisational structure and user relationships thus providing the foundation for…

Advisory Note

Advisory Note: Turning inattention into intention - 71501

How IoT will help drive the development of Life Management Platforms and affect your company’s future relationship with its customers.

Advisory Note

Best Practice: European Identity Award 2015: NORD/LB - 71401

EIC Award 2015 for Best Access Governance / Access Intelligence Project: Implementation of a large-scale, state-of-the-art Access Management and Access Governance project improving the bank’s compliance and efficiency while transitioning to “IAM as a Service” as a modern…

Leadership Brief

Leadership Brief: Alternatives to complex role projects and resource-consuming recertification - 72009

Enterprise Role Management and Access Governance are at the core of today's IAM systems to achieve efficient administration processes and compliance with regulatory requirements. Costly processes for the design and maintenance of large role-based projects and for extensive annual…

Advisory Note

Advisory Note: Redefining Access Governance - 71185

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think…

Executive View

Executive View: Courion Access Governance/Risk Products - 71046

The GRC triumvirate (Governance, Risk and Compliance) have long been mainstays of Identity Management (IdM). In fact, IdM has mutated into Identity and Access Management (IAM) as well as Identity and Access Governance (IAG).  Access Governance remains one of the fastest growing market…