1 -  A Modern Approach to Identity and

Access Management


Today’s approach to IAM is founded on the assumption that what is true today can and will change tomorrow. Identity professionals can best prepare for constant change by choosing solutions with:

 

A Bias Toward Flexibility and Future-proofing

Modern IAM solutions are built with a “hybrid IT” in mind and can flexibly adapt to protect any resource, no matter the type. A modern solution allows for deployment of web apps, mobile apps and APIs on-premises, in a private cloud or in the public cloud, all while maintaining the same level of access control.

 

Easy, Self-service Application Integration

Digital transformation requires rapid adoption of new resources, and IAM is critical to launch. Modern IAM enables security experts to provide a standard set of templates to business users so they can confidently launch their own apps and APIs, accelerating the rate of transformation and enterprise-wide security coverage.

 

Strict Adherence to Identity Standards

The use of identity standards ensures the secure delivery of identity attributes and supports the elimination of passwords. Comprehensive support for standards like SAML, OAuth 2.0, OpenID Connect, LDAP and SCIM ensure a wide range of use cases can be enabled.

 

A Wide Range of Enterprise Integrations

Modern IAM solutions don’t require complex, custom development to integrate with common enterprise technologies. They allow you to leverage existing investments in web access management, multi-factor authentication (MFA), directory solutions and more to enhance security and maintain business continuity.

 

Centralized Administrative Capabilities

A consistent application of security, irrespective of resource type and hosting location, is crucial to protecting your enterprise. Centrally managed contextual authentication, access security and data layer security provide the standardization you need to protect a diverse set of enterprise resources.

 

Seamless, Zero-downtime Migration

Modern IAM solutions weren’t built in a void; they are designed with easy transition from legacy IAM systems in mind. Built-in migration/synchronization tools, professional services and proven integration partners provide a stable coexistence period that gives organizations complete flexibility to implement in manageable phases.

 

Ability to Scale

Today’s IAM solutions are engineered for peak usage to eliminate outages when extreme scale is required. While you may not require extreme scale today, you’ll be able to resolve existing performance, stability and latency issues commonly associated with legacy IAM deployments.

 

Chapter 2