Identity Management: Security, access and the road ahead

We continue to experience many strides and steps forward in regard to technology advancement, especially as related to identity and access management solutions. Organizations will likely continue to make great strides as they try to gain more control over security and access to their data. Let me explain, we have read numerous times in recent years about the high-profile hacks and breaches of customer information. Yet, we seldom hear any detail about internal access breaches (breaches because of internal organizational issues). For example, where an employee inadvertently has access to sensitive information and uses it for nefarious purposes. These internal breaches may not be detrimental in the near term, but could pose significant risk should the employee decide to leave or have an axe to grind with the organization.

Large, multi-national organizations have been able to spend six to seven figure sums, assign internal teams and hire consultants for six to 18 months to ensure that processes like role-based access control (RBAC), attestation and reconciliation were running smoothly and accurately. However, small to mid-size organizations have found the cost and time to outweigh the benefits and have done the best they could to secure the internal network and data access with limited resources. This is changing. The solutions are finally available for all organizations, and when implemented, provide added protection to the security of an organization’s data.

We’ll continue to see solution providers take forward movement and provide great strides to offer simpler, low-cost solutions in identity governance and administration. These solutions mean organizations that were previously excluded from considering these products will now be able to implement these solutions without the needs of hiring consultants or spending their entire IT budget for the year on them.

As with so many other technologies, what started out as only accessible to a few, will now be driven down market to become a reality for many. The real winner in this scenario are these small to mid-size companies that will now be able to implement best-of-class solutions to secure data, application and network access without the burden of world-class prices.

The coming term ahead and the trends that develop will likely bring tremendous promise. If nothing else, the promises of the time to come appear to be one where more security it procured for organizations in so far as reducing unauthorized access to data and applications and securing the same on a “need to know” basis since they’ll likely continue implementing these solutions.

Dean Wiech is managing director of Tools4ever US, part of the global supplier of identity and access management solutions.


Leave a Reply

WWPI – Covering the best in IT since 1980