Scenario: Understanding Identity and Access Management - 70129

Report Details

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation “IAM”, along with current trends and ramifications for corporate IT systems.

IAM is primarily seen as a set of technologies which govern and regulate who is allowed access to which information stored or being processed within IT environments. Unfortunately, taking such a narrow technology-focused view deflects from the real value of IAM as a facilitator for creating business processes that are both more secure and more efficient than ever before. We see IAM as the key to unlocking IT’s true potential as a business enabler. In fact, in discussions within KuppingerCole, we often refer to “management by identity” instead of the classic “identity management”.
 
To really grasp the importance of IAM for a modern organization, it is necessary to take a holistic view, one that takes into account not only the technology itself, but also the business processes and the organizational structures it impacts. All of this ties into the Big Picture of Information Security, namely how to maintain the confidentiality, integrity and availability of data. It is about how to protect both the information and the information systems from attacks from without and within, for instance through unauthorized use, disclosure, modification, or destruction. It is also about being able to provide proof that none of these things have happened, either to internal auditors or to regulators or law enforcement authorities. Unlike such related fields as Computer Security and Information Assurance, Information Security is more about risk management, process control and business continuity and less about specific technical solutions. Information Security is about typing people, processes, and information. For this reason, we believe that IAM should be an important item of the agenda of top management within every organization since it affects strategy decisions. In short, leave the technical details to the experts, but make sure they know what is expected from them.

Which is not to say that technology is not an important issue; in fact reaching the goals set out in your IAM strategy will inevitably call for orchestrating a set of technologies, ranging from basic directories to specialized solutions for securing applications and databases. IT’s job is to bring all this together in a way that both protects and enables business.

IAM consists of building blocks, and in reality most organizations will not need all of them. In order to make informed decisions about which technologies are needed, KuppingerCole recommends following standard, tried-and-proven architectural approaches. Classically, this means either starting out by identifying use cases and taking a line from there, or alternatively asking the business units what they need and creating the appropriate business services, tweaking and fine-tuning them until they do the job they were requested for consistently, efficiently and at lowest possible cost.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 06, 2011

Scenario: Understanding Identity and Access Management - 70129

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation…

€995.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Whitepaper

Point of View Paper: One Identity - The Journey to IAM Success - 70226

Identity and Access Management (IAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts…

Executive View

Executive View: One Identity SafeGuard 2.0 - 71251

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities,…

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003

À l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients…

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - Management Summary - 74003

La « Transformation numérique » révolutionne les modèles de gestion et les processus au sein des entreprises, ainsi que les services apportés aux clients. Elle conduit à une intégration étroite entre l‘activité…

Survey

State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003

The „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well…

Survey

Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003

Organizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most…

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Executive View

Executive View: Ergon Airlock Suite - 72509

Ergon Informatik, a Swiss software vendor, delivers an integrated solution for Web Access Management, Identity Federation and Web Application Firewall capabilities that shows both breadth and depth in features. Furthermore, it comes with a good set of baseline identity lifecycle management…