Enterprise identity and access management poses key challenges

October 2008 Integrated Solutions

Enterprise identity and access management (EIAM) has caught the attention of many corporations as a way to manage information and provide authentication for users wishing to access the company’s database and systems. Many security companies have taken on the development of EIAM, considering its potential value. A number, such as Deloitte, Touche LLP, Sun Microsystems and Accenture, have made a joint effort to leverage on each other’s experiences in corporate architectures and security systems to develop a robust EIAM system.

Their efforts are due to the recent demand for secured EIM systems for companies to protect their databases. However, Frost & Sullivan believes that there are several key challenges in EIAM that these developers need to address.

The first challenge is the reliability of the EIAM system. All profiles of an organisation’s employees will be stored in such a system and security and access policies will be set on each profile to ensure that every employee will be able to access the applications they need. However, if the profiles of the users are not well managed, they may become confused. This may then allow some users the opportunity to access confidential database information to which they should not be privy.

If there is any change in a user profile, the new information will have to be updated manually and correctly so that the user has the right control assess. Apart from internal users, vendors will also be given access priorities in developing the company infrastructure which may pose a security risk.

The second challenge is the usability of EIAM systems. If an employee needs to use more than one system over the course of his or her work, this person may end up having multiple logins and passwords to these multiple systems. This has to a large extent already been addressed in many of the newly developed EIAM offerings, where one login and password can be used across all systems and applications in a company across all branches. This helps to improve consistency.

The third challenge is integration. In a corporation, many applications and systems are required in a number of different departments for daily operations. The challenge that most security developers encountered when they tried to integrate disparate application systems and security infrastructure was that each had its own authentication technologies. Open source and standards-based approaches have however been combined to address this issue.

The fourth challenge is the exploitation on emerging technologies such as Identity 2.0 and Web 2.0 for EIAM systems. Identity 2.0 is a digital identity to provide access control that originated from the Web 2.0 theory. Identity 2.0 emphasises using one ID that is transparent and flexible for each user. However, there are potential risks in Identity 2.0 such as identity phishing. These risks need to be investigated further, as the Identity 2.0 framework has not been completed and development work is still in progress.

The fifth challenge is for EIAM systems developers to create standards that enable data exchange enterprises that meet both the security policies and user preferences in a company. A significant problem often arises due to differences in the viewpoints of the users of the system and the management of the company that sets the security policies. Moreover, different policies are set in each company. This makes it particularly tough to create standards that will be agreeable to two or more different companies when they need to use the same system.

To overcome this challenge, the open source community is collaborating to build open development platforms and standards that can see eye-to-eye. These standards can serve as the foundation for an EIAM system.

In short, an end-to-end EIAM system that enables interoperability, security, and privacy is required to ensure security for the entire identity management lifecycle in an enterprise. Based on the current technology trend, Frost & Sullivan expects to see more developments in the EIAM research area and that these challenges will be addressed in the near future.

For more information on Frost & Sullivan’s technical and market analysis, please contact Patrick Cairns on [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...
Using KPIs to measure smart city progress
Axis Communications SA Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
United 4 Smart Sustainable Cities is a United Nations Initiative that encourages the use of information and communication technology (including security technology) to support a smooth transition to smart cities.

Read more...
Enhancing estate security, the five-layer approach
Fang Fences & Guards Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
Residential estates are designed to provide a serene and secure living environment enclosed within gated communities, offering residents peace of mind and an elevated standard of living.

Read more...
Creating employment through entrepreneurship
Technews Publishing Editor's Choice Integrated Solutions Residential Estate (Industry)
Eduardo Takacs’s journey is a testament to bona fide entrepreneurial resilience, making him stand out in a country desperate for resilient businesses in the small and medium enterprise space that can create employment opportunities.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...