Enhance Security and Achieve Compliance
Enhance security and achieve compliance The "get to one" approach enhances security by providing a more consistent and controllable environment from which security principles can be established and enforced. It also strengthens authentication for systems and applications pulled into Active Directory, providing for traditional multi-factor authentication solutions to be implemented consistently across the entire newly-unified enterprise.It will also provide powerful auditing and reporting tools to collect and distribute information from a central identity repository, based on the unified identity in Active Directory. The key is to unify identities completely. In reality, some systems or applications cannot have their identity subsystems fully unified within the existing infrastructure, so in those cases, a "get as close to one as possible for as many systems as possible" approach still can provide good opportunities to simplify identity and access management, and to obtain improved efficiency and enhanced security and compliance. Jackson Shaw is Senior Director of Product Management for Identity and Access Management at Quest Software. Jackson joined Quest as part of its acquisition of Vintela. He oversees product direction, strategy and go-to-market activities for Quest. Prior to Quest, Jackson was a key member of the identity and access management marketing team for the Windows server marketing group at Microsoft. He was responsible for product planning and marketing for Microsoft's identity and access management products, including Active Directory and Microsoft Identity Integration Server (MIIS) 2003. Jackson has been involved in directory, meta-directory and security initiatives for 20 years. He has spoken at various industry events and writes a popular identity management blog. Check it out at http://jacksonshaw.blogspot.com. He can also be reached at email@example.com.
Finally, a "get to one" solution will empower organizations to achieve compliance by unifying previously non-compliant platforms into the inherently-compliant Active Directory infrastructure. It will enable the enterprise to implement strong authentication for both Windows and non-Windows systems.