Supporting organizations in selecting and implementing Identity and Access Management technologies: The IAM Services Assessment Model

نویسنده

  • Peter Haag
چکیده

This chapter investigates how organizations can be supported in selecting and implementing Identity and Access Management (IAM) services. Due to the ever growing number of applications that are being used in organizations, stricter regulations and changing relationships between organizations, a new approach towards loginand password administration, security and compliance is needed. IAM services claim to provide this new approach. Unfortunately, IAM selection projects have not been very successful in the recent past. Therefore, this chapter presents the IAM Services Assessment Model which provides a useful and usable tool to support organizations in the selection and implementation of IAM services. INTRODUCTION During the recent decades, organizations have changed tremendously. One of the most important changes has been the mass-computerization, which has forced organizations to change the way they operate. This mass-computerization has been one of the most important enablers of the ongoing increase in both the size and the complexity of organizations. It is self-evident that those developments have had a wide range of consequences. Most have been positive, but during recent years some negative consequences of those developments have surfaced as well. Some of those negative consequences are related to the way organizations manage identities and the access to their buildings and their IT-infrastructure. To deal with those negative consequences, the way in which the identification and authentication for access to an application is organized needs to be changed. During recent years, several major IT-suppliers like Oracle, IBM, Sun Microsystems, Novell and CA have introduced IAM systems in order to support organizations in doing so. An article on the website of Wall Street Technology (Wall Street Technology, 2008) reports that a new research from Forrester estimates the market for IAM solutions to grow more than 20 percent over the next years. The total market is expected to grow from 2.6 billion dollars in 2006 to more than 12.3 billion dollar in 2014. Despite the fact that these figures show that a growing amount of organizations is planning to implement IAM technologies, efforts to select and implement the right solutions have proven to be little successful (Becker & Drew, 2005). Therefore, the question arises if there is any way in which organizations can be supported in making the right decision with regard to the type of IAM solution they should implement. This chapter is aimed at developing a method to support organizations and their consultancy partners in effectively and efficiently selecting the right tools to cope with the challenges they have identified in the field of Identity and Access Management.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Dynamic Identity and Access Management in Organizations

Efficient and secure management of access to resources is a crucial challenge in today’s corporate IT environments. During the last years, introducing company-wide Identity and Access Management (IAM) infrastructures building on the Role-based Access Control (RBAC) paradigm has become the de facto standard for granting and revoking access to resources. Due to its static nature, the management o...

متن کامل

Economics of Identity and Access Management: a Case Study on Enterprise Business Services

© Economics of Identity and Access Management: a Case Study on Enterprise Business Services Marco Casassa Mont, Yolanta Beres, David Pym, Simon Shiu HP Laboratories HPL-2010-12 economics, decision support, IAM, modeling, simulation, security, case study Identity and Access Management (IAM) is a key enabler of enterprise businesses: it supports automation, security enforcement and compliance. Ho...

متن کامل

Using Digital Right Management technology in IRANDOC ETD System

Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of  information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system. Method: This research is an applied re...

متن کامل

Assessment of VSM Scenarios by Simulation of Logistics Systems in Petrochemical Company

Believe that VSM involves the concurrent improve of processes, organizations, and their supporting information systems to achieve radical improvement in time, cost, quality, and customer’s regard for the company’s products and services.  Nowadays, simulation is the most important way to do VSM and improving logistics processes. A time study was performed by measuring the time duration per proce...

متن کامل

Identity and Access Management for Complex Research Data Workflows

Identity and Access Management (IAM) infrastructures already provide a crucial and established technology, enabling researchers and students to access services like computing facilities and electronic resources. However, the rise of complex and fully digitalized scientific workflows, world-wide research co-operations, and the reliance on external services and data sources poses new challenges t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010