Skip to content

Identity management sees biometrics as an alluring aspect, yet isn't its most efficient method, according to Kevin Cunningham of Sailpoint.

Delving into identity and access management typically involves considerations beyond biometric measures such as fingerprinting or iris scanning. There are additional aspects to explore.

Identity Management's Attractive Aspect Lies in Biometrics, Yet Efficiency Isn't Its Strongest Suit...
Identity Management's Attractive Aspect Lies in Biometrics, Yet Efficiency Isn't Its Strongest Suit According to Kevin Cunningham, Sailpoint

Identity management sees biometrics as an alluring aspect, yet isn't its most efficient method, according to Kevin Cunningham of Sailpoint.

In the ever-evolving digital world, organisations are grappling with the challenge of managing a diverse set of resources, from mainframe to SaaS applications. Integrating these individual usernames into a unified computer identity can be a complex task (Source: Unspecified).

The Identity and Access Management (IAM) market is currently experiencing a surge, with a heightened focus on managing identities to secure the dispersed security perimeter introduced by mobile and SaaS applications (Source: Unspecified). This renewed interest stems from the fact that a robust IAM programme can significantly reduce the risk of data breaches, which were prevalent in 2014 and continue to be a concern in 2015 (Source: Unspecified).

Technology is just one piece of the puzzle when it comes to defending against cyber attacks. The human element and the processes involved are the bigger challenges (Source: Unspecified). IAM ranks highly on the list of priorities for organisations, often appearing in the top three due to the numerous security breaches that can be traced back to a lack of identity management (Source: Unspecified).

There is a growing demand for an enterprise-wide IAM solution delivered via the cloud, known as Identity-as-a-Service (IDaaS) (Source: Unspecified). Key players in this market include eMudhra, which offers rapid deployment, native cloud integrations, multi-cloud support, mobile-centric authentication, and a strong compliance focus for emerging markets. CodeShield, on the other hand, emphasises proactive protection by detecting IAM privilege escalations and attack paths within cloud infrastructure for AWS environments (Source: Unspecified).

An effective IAM programme is an ongoing endeavour that requires its own budget and staff, as managing access is an ongoing problem (Source: Unspecified). Audit committees are alerted whenever there is a deficiency in IAM, making it a very hot topic (Source: Unspecified).

Companies with weak security programmes often lack in multiple areas, including IAM. A lack of due care can contribute to well-publicized data breaches (Source: Unspecified). Good security programmes not only enhance a journey but also help understand risk, improving productivity (Source: Unspecified).

A complete culture shift is often required for effective IAM, involving a re-engineering of processes. Organisations need to take more notice of how they are doing things internally and who is participating in those processes during IAM projects (Source: Unspecified).

The universe of applications that companies need to incorporate within their identity strategy is expanding due to the adoption of mobile devices, enterprise footprint in the cloud, and adoption of software-as-a-service (SaaS) applications (Source: Unspecified). This expansion necessitates good processes in place for collaboration across an organisation (Source: Unspecified).

The IDaaS approach must be able to manage on-premise and SaaS applications within a single governance view (Source: Unspecified). IAM touches many different areas of a company, making it crucial for maintaining a secure and efficient digital environment (Source: Unspecified).

Read also: