Secrets to a Non-Disruptive Identity Management Solution Implementation

Posted by Michael Tarbet on 7/7/16 7:00 AM

The accelerating pace of digital business is spurring heightened demands for customer identity data. New apps, devices and channels need customer information to deliver innovative services and better customer experiences. And they need much more than user names and passwords. They require security controls, rich engagement history information, privacy policies and customer preference data.

Outdated workforce Identity and Access Management (IAM) solutions, typically implemented in the 1990s, weren’t built to manage and deliver customer identity data at the scale and complexity of today's digital business. Many companies are faced with updating and upgrading their identity management technology to keep up with modern demands. But business needs to keep moving; you can’t afford a lapse in identity services while you get your new solution up and running.

Read More

Topics: Legacy IAM Modernization, Videos

Modernized Identity Management Improves Business Performance

Posted by Steve Tout, Guest Contributor on 6/23/16 9:00 AM

Steve is Founder and CEO of Forte Advisory, an information and consulting company helping transform business by building trust, reducing operational risk and improving user experiences. Follow Steve on Twitter @stevetout

Cloud computing is one of the biggest disruptive forces to the enterprise since smartphones and virtualization. Many business critical applications have been outsourced to cloud service providers, going beyond IT’s control and creating challenges with access controls, data governance, user provisioning and compliance while putting an organization’s sensitive data at risk. In order to address these risks and to enable the business at the same time, IAM has had to adapt with solutions that achieve far greater efficiency, scale, automation and security than before.

Read More

Topics: Data Management, Legacy IAM Modernization

IT Leaders Don’t Have to Sacrifice Productivity for Data Security

Posted by Steve Shoaff on 5/5/16 9:52 AM

Both the cost and frequency of data breaches have been on the rise in recent years. According to a study by the Ponemon Institute, the cost of data theft increased on average from $159 to $174 per record in 2015. In light of these statistics and the fact that security ranks as the number one concern on IT leaders’ minds, it seems counterintuitive that organizations still are not doing all they can to protect data and prevent breaches.

The reason may not be surprising to anyone who is balancing the often-conflicting demands of securing data and keeping operations humming along efficiently. When prioritizing between the two, the immediate needs of speed and productivity end up coming ahead of security, not by choice, but by urgency.

Read More

Topics: Legacy IAM Modernization, Security Best Practices

Best Practices for Transitioning to a New Identity Management Solution

Posted by Michael Tarbet on 4/1/16 9:30 AM

Digital business is placing unprecedented demand on identity services. Customer and workforce profile data is needed to drive most aspects of mobile, Web and Internet of Things (IoT) engagement and productivity. Yet, legacy identity and access management (IAM) systems and directory servers, most of which were built using technology from the 1990s, weren’t designed to handle these modern use cases.

The requirements for today’s identity and access management solutions are vastly different. In the past, IAM systems managed employee data and governed access to internal systems within well-defined firewalls. Today, IAM solutions must manage customer identity data collection, use and sharing in addition to workforce system access. Customer identity management is intricately tied to strategic business initiatives, and it necessitates an entirely different set of capabilities: 

Read More

Topics: Customer Experience, Legacy IAM Modernization

Improving Identity Management Scale and Performance

Posted by Caroline Castrillon on 1/28/16 8:30 AM

The volume of identity data is growing to unprecedented amounts as digital business generates and consumes more types of data for more customers. User profiles with only a name and email address are morphing into rich profiles that include data such as preferences, browser data, passwords, geo-location and much more. Add to this the fluctuating demand for this data as customers simultaneously access apps and services during peak times, for example during the holidays for retailers, and it’s easy to see why improving scale and performance is increasingly important to identity and access management professionals. 

Read More

Topics: Legacy IAM Modernization

The Changing Landscape of Identity and Access Management

Posted by Emeka Obianwu on 12/29/15 10:00 AM

Dan Coffing is the CEO of Syntegrity, an intelligent data security services company. During the recent Gartner IAM Summit, Dan took a few moments out of the show to speak with UnboundID about the state of the Identity and Access Management industry, where it's headed in the future and how IAM professionals can succeed in this time of rapid change.

UnboundID: What are some of the biggest changes you are currently seeing in Identity Management? 

Coffing: The most significant development for those of us managing identity data is the evolution of digital business. Companies are recognizing that not only must they continue to manage identities internally with increasing security sensitivities, but they must also serve the identity demands of providing digitally based marketing and services to external customer audiences. This radically changes the scale requirements for their infrastructures. Meeting the identity demands of multichannel digital customer engagement requires an exponentially larger scale than managing internal employee identities.

Read More

Topics: Data Management, Legacy IAM Modernization

Countdown of the Top 4 Spookiest Identity Management Challenges

Posted by Keri LeBlanc on 10/30/15 9:30 AM

It’s that time of year when we focus our attention on what terrifies us. Even for the bravest among us who don’t flinch easily during horror flicks or jump at the sight of fake blood in the neighborhood haunted house, there are real-life business scenarios that quicken our pulse and keep us up at night.

IT and business executives are faced with the rapid pace of digital growth, creating a fear-inducing environment of change and uncertainty. As the market landscape shifts, many companies are striving to excel in the digital realm by enabling their workforce with innovative tools and by delivering inspiring customer experiences, two initiatives that depend on identity data. As change brings its share of headaches and panic-stricken moments, there are 4 scenarios that rise to the top of the nightmares plaguing IT and business professionals involved with identity data management.

Read More

Topics: Mobile Apps, Customer Experience, Data Management, General, Identity API's, Legacy IAM Modernization

The New Face of Identity Management Is the Customer

Posted by Keri LeBlanc on 7/22/15 12:31 PM

Dave Malcolm is Vice President of Engineering at UnboundID. Through previous executive product positions with Quest Software, Surgient, Motive Communications, and Tivoli Systems, Dave has garnered nearly 25 years of experience leading the development of high technology products targeted to enterprise buyers.

UnboundID: What’s the difference between workforce or employee identity and access management (IAM) and customer identity management systems?

Malcolm: Workforce identity management systems are deployed to reduce security risks by controlling access to applications and also to reduce costs through automating the user provisioning and entitlement processes. Customer identity management systems are deployed to increase revenue by delivering superior customer experiences through the use of customer data. Consumer systems are architected to manage millions or even hundreds of millions of identities whereas workforce systems generally will not scale to those numbers because they were designed to handle, at the most, a couple hundred thousand identities. 

Read More

Topics: Consumer Identity and Access Management, Legacy IAM Modernization

Modernizing to a Web Scale LDAP Directory Server Helps Meet Changing IAM Demands

Posted by Ishan Kumar on 6/5/15 10:14 AM

The scope and scale of identity and access management (IAM) is rapidly changing. While its purpose of managing internal employee, retiree and partner identities has remained the same, the demands placed on IAM have dramatically increased. Businesses are implementing a diverse range of new, modern apps to improve productivity. Many organizations are moving to virtualized infrastructures or to the cloud. At the same time, IT teams are under relentless pressure to contain costs while improving security. Plus, the workforce has come to expect the same convenient access and continuous system uptime they experience with consumer-facing technologies.

It’s a lot. And legacy IAM systems simply weren’t built to handle these scale, performance and security demands. If we take a brief look at the history of LDAP directory servers, it’s not hard to see why. From 1995 to 2005, the industry underwent a period of investment and innovation as major companies developed directory servers purpose-built for enterprise employee identity management, but in 2006, these companies shifted their focus from developing new technologies to releasing patches for existing systems.

Read More

Topics: Legacy IAM Modernization

Is Your Legacy Identity and Access Management Solution Your Weak Link?

Posted by Keri LeBlanc on 5/27/15 10:04 AM

There’s no doubt old technology can slow down productivity and increase costs. It takes up large amounts of datacenter space, functions with limited or outdated capabilities, and consumes large amounts of energy, not to mention the poor performance and outage issues typical of aging systems. Combine this with higher maintenance costs and a struggle to find anyone who will still support the old system.

But in today’s digital world, the negative impact of legacy identity and access management (IAM) solutions goes even further. Identity data is increasingly becoming the center of digital business, enabling everything from mobile apps and e-commerce transactions to customer service. As a result, more demands are being placed on identity management solutions, both for managing internal employee, retiree and partner data and managing customer data:

Read More

Topics: Legacy IAM Modernization