Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data. IAM software is used by enterprises to control the flow of sensitive data in and out of the network.
Next Steps
-
IAM solution implementation: Challenges & resolution
IAM solution implementation programs must be ca...
(searchSecurity.in) -
Using an IAM maturity model to hone identity and access management strategy
Forrester Research’s Andras Cser discusses how ...
(SearchSecurity.com)
Effective integrated access management tools incorporate four elements:
- A method of providing users access to applications, systems and documents throughout an enterprise that are required for individual job function.
- The ability to authenticate a user at the proper access level, based upon the principle of least privilege (POLP).
- A single sign-on (SSO) that easily allows users to access resources to which they have been granted access.
- A means to generate an audit trail to confirm the IAM system is working properly and meet compliance requirements.
Security experts recommend the use of multifactor authentication (MFA) to validate user identity, including biometric data, smart cards and RFID chips.
Learn more about IT:
> Security expert Joel Dubin exposes IAM blunders this tip about worst practices.
> Joel Dubin explains how multifactor authentication works in IAM suites
Tech TalkComment
Share
Comments
Results
Contribute to the conversation