Enterprise identity and access management poses key challenges

October 2008 Integrated Solutions

Enterprise identity and access management (EIAM) has caught the attention of many corporations as a way to manage information and provide authentication for users wishing to access the company’s database and systems. Many security companies have taken on the development of EIAM, considering its potential value. A number, such as Deloitte, Touche LLP, Sun Microsystems and Accenture, have made a joint effort to leverage on each other’s experiences in corporate architectures and security systems to develop a robust EIAM system.

Their efforts are due to the recent demand for secured EIM systems for companies to protect their databases. However, Frost & Sullivan believes that there are several key challenges in EIAM that these developers need to address.

The first challenge is the reliability of the EIAM system. All profiles of an organisation’s employees will be stored in such a system and security and access policies will be set on each profile to ensure that every employee will be able to access the applications they need. However, if the profiles of the users are not well managed, they may become confused. This may then allow some users the opportunity to access confidential database information to which they should not be privy.

If there is any change in a user profile, the new information will have to be updated manually and correctly so that the user has the right control assess. Apart from internal users, vendors will also be given access priorities in developing the company infrastructure which may pose a security risk.

The second challenge is the usability of EIAM systems. If an employee needs to use more than one system over the course of his or her work, this person may end up having multiple logins and passwords to these multiple systems. This has to a large extent already been addressed in many of the newly developed EIAM offerings, where one login and password can be used across all systems and applications in a company across all branches. This helps to improve consistency.

The third challenge is integration. In a corporation, many applications and systems are required in a number of different departments for daily operations. The challenge that most security developers encountered when they tried to integrate disparate application systems and security infrastructure was that each had its own authentication technologies. Open source and standards-based approaches have however been combined to address this issue.

The fourth challenge is the exploitation on emerging technologies such as Identity 2.0 and Web 2.0 for EIAM systems. Identity 2.0 is a digital identity to provide access control that originated from the Web 2.0 theory. Identity 2.0 emphasises using one ID that is transparent and flexible for each user. However, there are potential risks in Identity 2.0 such as identity phishing. These risks need to be investigated further, as the Identity 2.0 framework has not been completed and development work is still in progress.

The fifth challenge is for EIAM systems developers to create standards that enable data exchange enterprises that meet both the security policies and user preferences in a company. A significant problem often arises due to differences in the viewpoints of the users of the system and the management of the company that sets the security policies. Moreover, different policies are set in each company. This makes it particularly tough to create standards that will be agreeable to two or more different companies when they need to use the same system.

To overcome this challenge, the open source community is collaborating to build open development platforms and standards that can see eye-to-eye. These standards can serve as the foundation for an EIAM system.

In short, an end-to-end EIAM system that enables interoperability, security, and privacy is required to ensure security for the entire identity management lifecycle in an enterprise. Based on the current technology trend, Frost & Sullivan expects to see more developments in the EIAM research area and that these challenges will be addressed in the near future.

For more information on Frost & Sullivan’s technical and market analysis, please contact Patrick Cairns on [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...