Scenario: Understanding Identity and Access Management - 70129

Report Details

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation “IAM”, along with current trends and ramifications for corporate IT systems.

IAM is primarily seen as a set of technologies which govern and regulate who is allowed access to which information stored or being processed within IT environments. Unfortunately, taking such a narrow technology-focused view deflects from the real value of IAM as a facilitator for creating business processes that are both more secure and more efficient than ever before. We see IAM as the key to unlocking IT’s true potential as a business enabler. In fact, in discussions within KuppingerCole, we often refer to “management by identity” instead of the classic “identity management”.
 
To really grasp the importance of IAM for a modern organization, it is necessary to take a holistic view, one that takes into account not only the technology itself, but also the business processes and the organizational structures it impacts. All of this ties into the Big Picture of Information Security, namely how to maintain the confidentiality, integrity and availability of data. It is about how to protect both the information and the information systems from attacks from without and within, for instance through unauthorized use, disclosure, modification, or destruction. It is also about being able to provide proof that none of these things have happened, either to internal auditors or to regulators or law enforcement authorities. Unlike such related fields as Computer Security and Information Assurance, Information Security is more about risk management, process control and business continuity and less about specific technical solutions. Information Security is about typing people, processes, and information. For this reason, we believe that IAM should be an important item of the agenda of top management within every organization since it affects strategy decisions. In short, leave the technical details to the experts, but make sure they know what is expected from them.

Which is not to say that technology is not an important issue; in fact reaching the goals set out in your IAM strategy will inevitably call for orchestrating a set of technologies, ranging from basic directories to specialized solutions for securing applications and databases. IT’s job is to bring all this together in a way that both protects and enables business.

IAM consists of building blocks, and in reality most organizations will not need all of them. In order to make informed decisions about which technologies are needed, KuppingerCole recommends following standard, tried-and-proven architectural approaches. Classically, this means either starting out by identifying use cases and taking a line from there, or alternatively asking the business units what they need and creating the appropriate business services, tweaking and fine-tuning them until they do the job they were requested for consistently, efficiently and at lowest possible cost.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 06, 2011

Scenario: Understanding Identity and Access Management - 70129

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation…

€995.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Executive View

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Executive View

Executive View: Hitachi ID IAM Suite - 72543

Hitachi ID offers an all - in - one IAM package to address enterprise business  requirements.   With an emphasis on  process automation and self - service, the  Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and…

Advisory Note

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the…

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Executive View

Executive View: ForgeRock Access Management - 71316

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system.  It provides numerous authentication options, an adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards…

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Advisory Note

Advisory Note: Consumer Identity and Access Management for “Know Your Customer” - 71701

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect,…

Executive View

Executive View: Avatier Identity Management Suite - 71510

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00