Changes are needed within the IAM infrastructure to make business more secure and productive

News by Dan Raywood

Identity management is forcing a change in the way IT teams work, as new methods and technologies should be adopted.

Identity management is forcing a change in the way IT teams work, as new methods and technologies should be adopted.

Christopher Zannetos, president and CEO of Courion, said that the common problem of identity and access management (IAM) is ensuring that the right people have access and that the concept of identity has to change.

He said: “You need to bring more things together than traditional identity, there is the context of the person, what they are doing and what they are accessing and how. If you cross IAM with data loss prevention (DLP) and activity, you create access intelligence capability.

“This brings together five things: identity; entitlements; policy; activity; and asset classification. You pull these together and you add business intelligence. How do you know who has access and to what? You have got to be able to pull it together and combine your activity.”

Zannetos went on to claim that its typical customer is changing from being a chief information security officer (CISO) to more of a general chief security officer role, as they understand that access is strategic for the business.

Steve Johnson, UK channel director at Extreme Networks, told SC Magazine that with roaming devices and the challenge of everyone ‘working everywhere', IT departments are now working harder than ever before to manage users.

“IT departments want users to buy devices but they want to manage them. The network is more important than it ever has been and the reality is to take advantage of IT, the network has to be invisible to the user,” he said.

He also claimed that a simple method of authenticating users is to use what is stored in Active Directory, as a switch will control access across the network and also ensure the availability of services that the user expects.

He said: “Using information that is being managed in Active Directory, you use it as a human database and compartmentalise it into teams and how they need to be managed. Our Exos software allows automation of it and specifically the automation of relevant network services to relevant people and only them.”

Topics:

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Upcoming Events