Category Archives: Provisioning

What you need to know about IAM System Migration

Comments Off on What you need to know about IAM System Migration

Successful IAM System Migration

“If you have to decide for a new house – Would it look exactly like your current home?”

Replacement of IAM legacy systemsThe question of system migration is a boon companion for IAM customers. Over the years, some established solutions like BMC’s Control-SA and SUN’s Identity Manager had to leave the market for various reasons. For existing customers of such systems, the replacement of their current installation is becoming a compelling need for the near future. With regards to this enterprise, several vendors are advertising and promising a smooth migration from the existing legacy solution to their platforms.

They argue, that certain tools will help to automatically convert and migrate existing data configurations to the new environment. But to tell the truth, an IAM system migration is a comparable effort like moving a home. To stay in this picture: Would it be really a big advantage for you, if the mover could place your furniture in the new home without instructions, because the old ground plot could be used for the new destination?

Tags:

IAM for Insurance Provider

Comments Off on IAM for Insurance Provider

Insurer gain secure access to all applications – IAM for insurance provider

IAM for insurance provider

IAM for insurance provider

Insurance providers are often businesses with complex, distributed structures are faced with the challenge of managing complex and heterogeneous IT landscapes centrally and effectively, all the while being under extreme pressure to save time and costs. Mergers and acquisitions have further added to this challenge  in recent years. All the thousands of employees require access to a broad range of different software systems depending on their tasks.

Tags: | |

Observations on the Role Life-Cycle

Comments Off on Observations on the Role Life-Cycle

Dynamic organisations need to consider role life-cycle models

Role-Life-Cycle

Role-Life-Cycle

The main goals that companies want to achieve in security administration are enhanced security at a low cost, while coping with the challenges of an increasingly complex IT environment. A high level of security is important to prevent possible losses through fraud and unauthorised disclosure of confidential information. Internal audits often encounter severe security weaknesses which oblige the IT security department to take appropriate countermeasures.

An increasingly dynamic economy is an additional challenge within this context. The most important issues here are the rapid growth of companies, large-scale mergers, the ubiquity of the internet and continuous organisational change.

As most companies intensify their business of the internet, they are dealing with very large numbers of users.

Tags:

Measurable IAM benefits – an infrastructure task – Part (2)

Comments Off on Measurable IAM benefits – an infrastructure task – Part (2)

Increased Security Levels

identity and access management

identity and access management

After looking at the most important benefits of Identity and Access Management in my last post  I will continue with another post where I will especially be considering the increased security levels you can achieve with Identity and Access Management and its strategic benefits to the enterprise. 

Tags: |