Authentication blues? Consider cloud identity management
A comprehensive collection of articles, videos and more, hand-picked by our editors
As security concerns increase, so does the need to properly identify the individuals using your systems. Identity...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
management deals with identifying individuals in a system and controlling their access to resources within that system. This also includes locking down systems after employees have moved on. So where does your organization stand on implementing identity management measures? Check out our CIO Briefing on identity management for the latest news, resources and advice to help you understand and evaluate this growing trend.
This guide is part of SearchCIO.com's CIO Briefings series, which is designed to give IT leaders strategic guidance and advice that addresses the management and decision-making aspects of timely topics. For a complete list of the topics covered to date, visit the CIO Briefings section.
Authentication in the cloud
Identity management (IDM) in cloud computing is a nebulous application for most enterprises. While new products and standards efforts promote cost savings and management efficiencies, it all boils down to trust.
"I worry about authentication in the cloud," said Phil Kramer, chief technology officer of Systems Solutions Technologies LLC In Old Hickory, Tenn., a consultancy and systems integrator with more than 30 years of experience in enterprise-wide deployments of network infrastructure and information security. "I worry that encryption will be tightly coupled with weak authentication. Username and password would not be enough for me."
Federating Identity management makes sense, especially in a cloud environment where users are logging onto to multiple systems within and outside the firewall, Kramer acknowledged. Internal IDM is all about account provisioning, assigning user access to systems and resetting end user passwords; interbusiness IDM is about identity mapping within a partner's context.
Learn more in "Identity management in cloud computing courts enterprise trust.” Also:
- Federated identity management urgently needed in the cloud
Federated identity management groups and vendors toss up standards and solutions, as enterprises attempt to wrest control of user access to cloud-based applications.
- Cloud computing identity management standards could push cloud use
Cloud computing identity management standards are in the works to ensure the open and secure exchange of identities in the cloud.
SaaS and identity management
Software as a Service (SaaS) might be here to stay, but that doesn't mean it is easy or fast to develop. Independent software vendors (ISVs) and CIOs deploying private clouds could benefit from a SaaS platform that turns existing applications into full-bodied, multi-tenant programs.
That's the route Market6 LLC took in deploying a SaaS for its supermarket customers. The Walnut Creek, Calif.-based data aggregator provides predictive analytics so that stores know the quantities of food they have in stock and the amount of movement to expect.
Find out more in "SaaS platform gives Market6 multi-tenancy and identity management.” Also:
- CA to acquire Arcot Systems for SaaS identity management
CA said Arcot's software as a service delivery model could help accelerate its delivery of CA identity and access management technologies from the cloud.
- Is Identity Management as a Service (IDaaS) a good idea?
IDaaS is new on the managed security service provider scene, so how can you know which of these SaaS service providers to trust with your identity and management access tools? Find out in this expert response.
Identity management and the business
Provisioning new employees with IT access, making a fast, clean digital break with departing employees and keeping up with changing access rights is important, especially for organizations like Brookdale Senior Living Inc., which are subject to SOX and Health Insurance Portability and Accountability Act compliance. But is identity and access management (IAM) a job for seven full-time security professionals?
"In the senior living industry, at certain levels, there is quite a bit of turnover. In some jobs we have more than 100% turnover in a year," said Scott Ranson, CIO for the fast-growing Brookdale Senior Living, which employs about 32,000 people in 560 locations and manages them with an IT team of 95.
But keeping track of employees was not just an IT problem, as Ranson discovered when he convened the company's business process owners to talk about using technology to automate some of these transactions.
Learn more in "CIO turns to identity and access management to solve business problem.” Also:
- Why CIOs need to get real about identity and access management
Changes in business, employee needs and regulatory mandates are reshaping identity and access management (IAM) and giving rise to service providers. Should you sign on with one?
- Gartner: How to succeed at identity and access management
Gartner IAM summit featured few real identity management success stories.
- Resource Center: Identity management technology and strategy (SearchSecurity.com)