Blog posts

Chapter 1
What Is Identity & Access Management?
 

IAM Core Technologies: IGA, Access Management, PAM

Dealing with customers, consumers, or connected things is about dealing with their digital identities. It is about IAM.

IAM, sometimes abbreviated to Identity Management, is easy to describe: It is everything that helps in managing identities and their access.

It is about the “who” and the “what”: Who can do what in IT? Who can log on? Who can access which data?

IAM consists of a wide range of technologies. However, there are three technologies at the core:

  • User Lifecycle Management & Access Governance
  • Access Management & Federation
  • Privileged Access Management

While these areas form the foundation of IAM, there are more elements in IAM such as directory services as sort of a database of all the users, and Identity Verification for the first-time proof of an identity during the onboarding process, e.g., by comparing the face via video with the photo on the person’s passport.



Click here to watch another video on Virtual Directory Services.


Back to top


 

Chapter 2
What Is Identity & Access Management?
Identity & Access Management (IAM) is one of today's core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy.

However, IAM is not limited to security, but is also one of the enablers of digital transformation.
'Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and other aspects of digital transformation has meant that users of privileged accounts have become more numerous and widespread. To reduce the risk of privileged accounts being hijacked or fraudulently used, and to uphold stringent regulatory compliance within an organization, a strong PAM solution is essential.';
At the same time, the threat situation has continuously intensified. Identity theft and fraud are commonplace. Digital infrastructures of all kinds are subject to continuous attacks from a wide variety of actors. The geopolitical situation, which changed with force in March 2022, brings new and more threats, and the number of hostile actors increases even more. While this is only one of the drivers, the overall number of attacks is consistently increasing. Platforms and users alike must be comprehensively and sustainably protected against this. This does not only concern the interaction of customers with online platforms for the sale of goods and services. Company employees (both employed and external) will also increasingly want to access company resources from anywhere in the future. Changing supply chains enable completely new ways of interaction between companies, their partners, and their respective employees.

Chapter 3
What Is Identity & Access Management?