IAM - the foundation of effective security

November 2007 Access Control & Identity Management

The concept of identity and access management (IAM) has been top of mind in corporations for some time.

The reason for its longevity is not the success companies have experienced in managing their security, but the general failure of IAM solutions in securing corporate information assets.

"One mistake companies make in trying to implement IAM is to assume there is a single, simple solution they can implement," says Fujitsu Services' Ugan Naidoo. "Effective IAM is, in fact, an integral part of a company-wide security architecture that needs to be designed and implemented with due consideration to the specific requirements of the business in question."

The various components that make up an IAM solution within this architecture, whether hardware, software or services, need to be effectively integrated with each other to ensure they all work together to achieve the corporation's security requirements. This is independent of whether the components are from the same supplier or even run on the same platform. Moreover, the implementation team also needs to put the final solution through rigorous testing to discover any weak links in the integrated system and secure them before going live.

"Another mistake often made in designing an IAM solution is to focus on technology," warns Naidoo. "IAM is built from the relevant hardware and software components, but it is first and foremost a business solution designed to assist the organisation in achieving its goals. Technology is simply an enabler."

Furthermore, care must be taken when employing the correct IAM consulting and design team since the solution created will need to be deployed across multiple applications and platforms to seamlessly support the company's business processes. It also needs to be flexible enough to easily accommodate any changes that may occur in the future, without compromising security in any way.

One of the methods of ensuring the solution effectively meets the needs of the company now and into the future is to run regular vulnerability tests, or retain a professional organisation to conduct these exercises regularly. Naturally, these tests will cover the organisation's full security implementation, including the IAM components, which are the foundation successfully securing corporate information assets.

The benefits of IAM

When an IAM project is carried out correctly, the first benefit is that the organisation will end up with a more effective way to control access to systems and data. IAM does not only prevent unauthorised access to sensitive areas, it also provides easier access to applications and data to authorised users. Instead of maintaining the age-old problem of users forgetting their passwords for different applications, the IAM solution simplifies access without compromising security.

Traditional IAM solutions were dispersed over various systems and platforms according to different standards, and were not designed to work together. This increased the management and administration burden considerably as every change to users' details needed to be replicated across all systems. This all at a steep price.

"An efficient design, as we recommend today," says Naidoo, "will ensure the company has a single, accurate resource of personnel information spanning the entire organisation. Any changes that need to be made as people join or leave the company, or are promoted, can be made in a single location. Not only does this save time and effort, it also reduces costs substantially."

Putting the time and effort required into an IAM solution will also result in IT administrators finding their jobs simplified as there will be fewer password and access problems to deal with on a Monday morning (the time most people complain about not remembering their passwords). Users will also be more productive since they are able to get on with their jobs without worrying about access controls.

IAM is obviously something all companies need, but few manage to do effectively. Without this solution, the identity of users accessing corporate assets can never be 100% verified and the integrity of business applications will always be suspect. Putting the right IAM solution in place, on the other hand, lets the right people access the right applications and data at the right time with no fuss. And that is what business needs.

For more information contact Ugan Naidoo, Fujitsu Services, +27 (0)11 233 5911, [email protected]

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Gallagher Security launches Augmented Reality Training in Australia
Gallagher Training & Education Access Control & Identity Management
Gallagher Security has announced the latest addition to its innovative suite of training solutions, Augmented Reality Training, demonstrating its continued commitment to innovation and improving access to security training opportunities.

Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.