Secure your access now

A company needs to be a specific size before identity and access management (IAM) really becomes a high priority and a hot topic, according to help AG.

Tags: help AG (www.helpag.com/)
  • E-Mail
Secure your access now Nicolai Solling from help AG says that a central authentication method is the most efficient.
By  Georgina Enzer Published  August 7, 2013

A company needs to be a specific size before identity and access management (IAM) really becomes a high priority and a hot topic, according to help AG.

A lot of IAM can be done by streamlining the way that an enterprises applications are authenticated, so the enterprise should look at using a central authentication mechanism for all of its users, according to Nicolai Solling, director of Technology Services at help AG Middle East.

“The authentication method could be a software token, which is a robust way of identifying an individual, and then make all applications use that token. That could get a lot of organisations to an advanced level of IAM compared to what they have today, because the individual does not have to remember 25 different identities, but just one,” says Solling.

Authentication has a number of standards for networks and applications, and companies must ensure their authentication solution complies to these standards. One of the most important in today’s IAM is Secure Assertions Markup Language (SAML), which allows access management vendors to provide federated authentication services for multiple enterprises that wish to use one another’s applications and data.
“Access has traditionally focused on physical access, which was dominated by HID prox, but that has given way to more innovative solutions like NFC,” explains Ray Wizbowski, international technology marketing executive, Gemalto.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code