For our premium content subscribers

Identity and Access Management

Digital transformation depends on consistent, clear, and secure identity management for every user, device, and asset across all lines of business. Identity management is the ability to set up and manage the relationships between users and things and to enforce rules for access and security. At its simplest, identity management must answer two questions: who/what are you, and what can you do?

These sound simple but have never been more complicated. Nor have the stakes ever been higher. For enterprises, the ability to manage the digital identities of every contributor, every customer, and every prospect is a fundamental requirement to realize the full benefits of cloud computing, mobility, and the Internet of Things (IoT).  Bottom line, every person (thing) of interest to the business must be able to access the resources they need to produce, buy, use, and recommend the products and services of the company.

 

Client Struggles

  • An increasingly distributed workforce and the death of the defensible perimeter
  • Distributed applications requiring authentication from any platform at any time
  • Productive provisioning, self-provisioning and instant-on
  • BYOD and the exploding expectations of ubiquitous highly-customized apps
  • Password management problems and the search for password-less security
  • Identity correlation to security events
  • Ever-growing regulatory compliance

How TechVision is helping

  • Architecture and deployment strategy
  • Identity data services
  • Privacy protection
  • Active directory integration and migration strategy
  • Service enablement and cloud integration
  • Authentication options, SSO, federation
  • Authorization options, roles, attributes, entitlements management
  • Credential management (certificates/PKI, biometrics, one-time passwords (OTP), password management, privileged access management)
  • Developing distributed, integrated IAM services
  • Building CIAM solutions
  • Understanding and leveraging early blockchain identity soutions
  • IoT enablement
  • IoT device authentication and behavior analytics

Practice Leads

Gary Rowe

Gary Rowe

Principal Consulting Analyst

Doug Simmons

Doug Simmons

Principal Consulting Analyst

Bill Bonney

Bill Bonney

Principal Consulting Analyst

 

 

© 2019 All Rights Reserved

We can help

If you want to find out more detail, we're happy to help. Just give us your business email so that we can start a conversation.

Thanks, we'll be in touch!

Stay in the know!

Keep informed of new speakers, topics, and activities as they are added. By registering now you are not making a firm commitment to attend.

Congrats! We'll be sending you updates on the progress of the conference.