What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Deploying an identity and access management system (IAM) is essential for enterprise security, according to a survey by Unisys of 150 executives at large U.S. companies. 87 percent of respondents plan to budget for IAM in 2005, and more than 55 percent plan to increase their budgets by 19 percent from 2004. www.unisys.com
A large food and general merchandise wholesaler in the United States had a strategic vision based on strengthening its relationships with the market’s largest retailers, and increasing its vertical penetration through the acquisition of niche channel wholesalers.