The Best Approach to Identity and Access Management

“I forgot my password!”

“Can you help me access this application from my laptop when I’m on the road?”

“I just bought this new application for our department and I DO NOT want to add another password to my people’s lives!”

“You need to secure access to this application for these specific users better than just a username and password… oh, and I don’t want any of my people to complain about it either.”

Any of these sound familiar?

A major chunk of every IAM professional’s life is dedicated to putting out fires, solving user access problems, and doing what I call “addressing the pain du jour”. And a major chunk of your organization’s investment in IAM technology is spent on solutions to automate and secure these most fundamental of IAM tasks. These day-to-day activities, which are meant to make people’s lives easier and the organization more secure often bog down operations to the extent that achieving business objectives is hindered and users view security as a barrier to their ability to do their job. Failure in a tactical IAM project is often the cause of heightened risk, weakened security, and audit findings.

So what are these tactical projects? There are too many to mention here but the most popular are:

  • Single sign-on – the things you do to make the user login experience as painless as possible across the heterogeneous environment.
  • Password management – the things you do to empower users to help themselves rather than calling IT every time they forget a password (a win-win for both sides).
  • Strong authentication – the things you do (either by choice or mandate) to assure the identity of the person logging on beyond the simple and traditional username and password approach.
  • Directory management – the things you do to automate and increase the efficacy of administering the directories that form the foundation for authentication and authorization (most often this means Active Directory).

There’s more, of course, but I would argue that every organization has an on-going project for at least three of these four “tactical” IAM tasks.

Each of these projects if done right can dramatically increase security and enable compliance while facilitating operational efficiency and ultimately achieving business objectives – rather than the all-to-common security for security’s sake. Here at Dell, and with our Dell One Identity family of IAM solutions, we’ve seen it all and done it all, and have found tactics, technologies, and strategies that can help any (or all) of these projects to be front-loaded for success.

In a new eBook called Future-proofing Your Tactical IAM Projects we discuss some of those lessons and provide guidance on how to ensure that your project is successful.

Get access management right.

In another eBook called Identity and Access Management for the Real World: Access Management we talk about the benefits and challenges of these activities. You know you’re doing these things, are you sure you’re doing them as well as you can? Let us help.

Share this post: