IAM - the foundation of effective security

November 2007 Access Control & Identity Management

The concept of identity and access management (IAM) has been top of mind in corporations for some time.

The reason for its longevity is not the success companies have experienced in managing their security, but the general failure of IAM solutions in securing corporate information assets.

"One mistake companies make in trying to implement IAM is to assume there is a single, simple solution they can implement," says Fujitsu Services' Ugan Naidoo. "Effective IAM is, in fact, an integral part of a company-wide security architecture that needs to be designed and implemented with due consideration to the specific requirements of the business in question."

The various components that make up an IAM solution within this architecture, whether hardware, software or services, need to be effectively integrated with each other to ensure they all work together to achieve the corporation's security requirements. This is independent of whether the components are from the same supplier or even run on the same platform. Moreover, the implementation team also needs to put the final solution through rigorous testing to discover any weak links in the integrated system and secure them before going live.

"Another mistake often made in designing an IAM solution is to focus on technology," warns Naidoo. "IAM is built from the relevant hardware and software components, but it is first and foremost a business solution designed to assist the organisation in achieving its goals. Technology is simply an enabler."

Furthermore, care must be taken when employing the correct IAM consulting and design team since the solution created will need to be deployed across multiple applications and platforms to seamlessly support the company's business processes. It also needs to be flexible enough to easily accommodate any changes that may occur in the future, without compromising security in any way.

One of the methods of ensuring the solution effectively meets the needs of the company now and into the future is to run regular vulnerability tests, or retain a professional organisation to conduct these exercises regularly. Naturally, these tests will cover the organisation's full security implementation, including the IAM components, which are the foundation successfully securing corporate information assets.

The benefits of IAM

When an IAM project is carried out correctly, the first benefit is that the organisation will end up with a more effective way to control access to systems and data. IAM does not only prevent unauthorised access to sensitive areas, it also provides easier access to applications and data to authorised users. Instead of maintaining the age-old problem of users forgetting their passwords for different applications, the IAM solution simplifies access without compromising security.

Traditional IAM solutions were dispersed over various systems and platforms according to different standards, and were not designed to work together. This increased the management and administration burden considerably as every change to users' details needed to be replicated across all systems. This all at a steep price.

"An efficient design, as we recommend today," says Naidoo, "will ensure the company has a single, accurate resource of personnel information spanning the entire organisation. Any changes that need to be made as people join or leave the company, or are promoted, can be made in a single location. Not only does this save time and effort, it also reduces costs substantially."

Putting the time and effort required into an IAM solution will also result in IT administrators finding their jobs simplified as there will be fewer password and access problems to deal with on a Monday morning (the time most people complain about not remembering their passwords). Users will also be more productive since they are able to get on with their jobs without worrying about access controls.

IAM is obviously something all companies need, but few manage to do effectively. Without this solution, the identity of users accessing corporate assets can never be 100% verified and the integrity of business applications will always be suspect. Putting the right IAM solution in place, on the other hand, lets the right people access the right applications and data at the right time with no fuss. And that is what business needs.

For more information contact Ugan Naidoo, Fujitsu Services, +27 (0)11 233 5911, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...
Multi-modal access control solutions
Suprema neaMetrics Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Suprema’s latest multi-modal access terminals are top-of-the-range, highly secure, easy to install, and easy to use. They feature biometrics, mobile access, and RFID and are both PoPIA and GDPR compliant.

Read more...
Battery-powered video doorbells
Ring Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Ring has announced the latest addition to its line of video doorbells. The Battery Video Doorbell Pro builds on the capabilities of its predecessor, providing greater value and convenience for homeowners.

Read more...
Tackling estate entrance challenges
Turnstar Systems Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The Velocity Raptor’s retractable spikes deter criminals from entering estate premises; equipped with LED lights, it provides visibility during the day and night, and in adverse conditions.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...
Digital transformation in estate environments
Regal Distributors SA Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Digital transformation has brought all users into digital processes across every industry and activity, interlinking activities and crossing industry boundaries. This complexity leads to significant changes in previously established workflows, especially in visitor management.

Read more...
Same old cables, new intercom
Hikvision South Africa Products & Solutions Access Control & Identity Management Residential Estate (Industry) Smart Home Automation
Retrofitting old residential complexes with a modern two-wire HD video intercom system is more than an upgrade. For many homeowners and renters, these systems represent a leap into the future.

Read more...