This week, the annual RSA conference will take place at Moscone Center in San Francisco. This event is admittedly one of the largest security conferences in the world and Covisint will have a strong presence. Come visit us at booth #1927.
From Utility to Asset
Security and Identity Management used to be non-exciting, IT-driven methods of securing the perimeter of an organization and protecting the integrity of its resources, assets and data.
Under the combined effects of three major trends — digital business transformation, extended global enterprise and consumerization of IT — identity management is shifting to the core of digital businesses.
Initially a means to manage user identities and manage access to systems or services, it is now used to uniquely profile these users, track their needs and behaviors, and drive efficiency and engagement. No wonder that 68% of enterprises report a budget increase in their IAM investments, according to a CapGemini survey (2016).
Diverse Use Cases
The identity and access management market has traditionally been segmented into 3 types of use cases:
|Type||Target Users||Main Use Case||Main Examples|
|B2E||Employees||Single sign on into internal and external (cloud, on-prem) apps and systems||Workforce SSO|
|B2C||Consumers||Access various internet resources and websites with existing consumer profiles or consistent username/password combinations||Social Login|
|Access third-party systems and share trusted information using a single set of credentials||Identity Federation
Their lines are increasingly getting blurrier and the Covisint Identity platform supports these main scenarios, with a unique optimization for the “outside in” B2B use cases, such as:
- Third-party access to apps
- External access to SaaS data
- Industry exchanges
- Consortia & alliances
As more business is done digitally and with more parties inside and outside, leading organizations should consider 5 key factors when reviewing IDaaS (identity as a Service) solutions:
- Ability to securely share information with a large network of external organizations
- Built-in support for external organization constructs and managing access at different levels (user, organization, application)
- Cross-organization delegated administration supporting n-level organizational hierarchy
- Out of the box support for integration, from cloud to enterprise WAM and legacy applications
- Ease of use and easy of support from a truly cloud-native vendor
Watch Andras Cser VP & Principal Analyst at Forrester Research and I discuss the new opportunities that Identity Management can unlock for digital businesses.