What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Novell have been around since the very early 1980s and will be associated by many with NetWare and, more latterly, their work in the open source area. With offices around the world, the company is active in many technology areas, including consultancy. It is therefore well placed to understand the eccentricities of network access control,…
In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.