Identity and Access Management
Our consultancy led approach to service covers all aspects of Identity and Access Management for Enterprise, Cloud and Mobile.
Identity Access Management (IAM) is the security discipline that manages an individuals’ principals, their authentication, authorization and privileges within or across their organisation. It provides the right access at the right times for the right reasons.
IAM is the critical foundation for realising business benefits in terms of cost savings, management control, operational efficiency and business growth.
Companies need to manage access to information and applications across internal and external platforms and applications. More importantly, they must provide this access for a growing number of identities without compromising security or exposing sensitive information.
IAM compromises of people, processes and products to manage identities and access to resources within the organisation, and can be classified into four major categories:-
Authentication
- Single sign-on
- Session management
- Password service
- Strong authentication
Authorisation
- Role-based
- Rule-based
- Attribute based
- Remote authorisation
User Management
- Delegated administration
- User and role management
- Provisioning
- Password management
- Self-service
Central User Repository
- Directory
- Data synchronisation
- Meta-directory
- Virtual directory
To be most truly effective, IAM should run through all areas of your business, allowing it to function efficiently and accurately. At its most efficient, an IAM programme will cover both in-house and mobile technologies, whether that be phones, devices or BYOD. It will also support, and be in sync with, your compliance and legal initiatives.