Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Identity Access Management to See Better Integration

    Written by

    Brian Prince
    Published February 12, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      With the Identity and Access Management market poised to grow, its expansion may be coupled with better integration and controls around role, entitlement and identity lifecycle management.

      According to a recent report by Forrester Research, the IAM (Identity and Access Management) market will see some explosive growth in the years ahead. The analyst firm estimated the market stood at about $2.6 billion in 2006, and by 2014 will hit $12.3 billion, with provisioning accounting for nearly two-thirds of all IAM revenues.

      The growth will come on the back of regulatory compliance initiatives as organizations try to control access to information, industry watchers said.

      IAM tools give customers a level of control and visibility into their assets needed to meet compliance goals, said Joe Anthony, program director of security and compliance management for IBM Tivoli software. The key though, may be to make IAM just one brick in an overall access strategy. Increased integration across security products will make it easier for business to address a wider range of challenges in the traditional areas of IAM, he said, as well as application, infrastructure and data security.

      “As a customer looks at their existing environment, they will see that IAM is a core thread throughout,” Anthony said. “A well thought-out IAM investment can be leveraged in many areas. Customers are becoming more sophisticated in how they want to define and manage roles, and they should expect to see increased integration across the traditional access management, user provisioning and role management offerings.”

      But it is in the areas of role and entitlement management where IAM will likely see some innovation, analysts said. Jonathan Penn, an analyst with Forrester, said he expects vendors to tie together those two areas-for example, access roles and provisioning roles being the same. Vendors would then provide for roles to be continuously monitored and managed based on what rights a user has and user behavior.

      Gartner analyst Earl Perkins agreed vendors would look to make advances in role lifecycle management, as well as provide an entitlements management framework for secure lifecycle development to prepare IAM to address service-oriented architectures.

      “There is a mismatch between what can described as entitlements administration, a granular level of managing entitlements that is missing from many IAM offerings,” he said. “It represents a realization gap between how the security policy that addresses compliance is actually realized in provisioning workflow and reporting.”

      Officials at CA, another player in the IAM space, said that in addition to identity lifecycle management, the company is building products to streamline the process of certifying and attesting to the validity of roles and entitlement needs for compliance requirements such as the Sarbanes-Oxley Act. But the ability to manage roles and identities over a period of time remains a key item on the Christmas list for customers, CA Security Strategist Bill Mann said.

      “The largest growth area is provisioning. Customers are trying to understand the identity lifecycle management-adding, removing and changing users’ rights and roles,” he said. “As they come into the organization, change their role and finally leave, you must be able to manage what rights are appropriate.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.