Digital identity today can be a fragmented, trustless mess

by in Security

Remember when Oculus rolled out their Quest 2 Virtual Reality Headset last year? Oculus, which was bought by Facebook in 2014 made the Quest 2 the first Oculus headset to require a Facebook login rather than a login with a separate Oculus account. Existing customers who had Oculus accounts were getting locked out of their new headsets as Facebook suspended their accounts when they attempted to merge them. That’s just one reason companies prefer to “own” identity management. But that also means protecting millions of account passwords while trying to build password recovery that’s user-friendly on a myriad of devices — some without a screen! Then there’s the issue of trust: we’ve learned that no one (or thing) should be trusted by default.

Digital identity today can be a fragmented, trustless mess.pngAs organizations modernize their identity and access management architectures, Micro Focus IAM solutions can help you deal with today’s complexities of digital identities.

  • It doesn’t matter whether identities are internal or external to the organization, if they are user devices or things, on-prem or in the cloud. Ensuring assets are properly managed and secured requires an Identity Governance and Administration (IGA) solution. But managing identities and governing their access rights can be quite complicated today. The NetIQ team has an IGA Buyer’s Guide that can help you work through the issues to determine a governance strategy.
  • NetIQ Identity Manager users, while having some of the components of governance, aren’t able to realize the full benefits of IGA. Our Professional Services team offers a packaged service to help Identity Manager customers leverage governance discovery. This can help Identity Manager users understand the benefits of IGA functionality without major disruptions.
  • We need to move beyond just policies given today’s threats. NetIQ Access Manager (NAM) monitors risk events triggered through behavior analytics to deliver continuous authentication to reduce or block high-risk access. This white paper, “Is Your Environment Adaptive Enough for Zero Trust?” discusses the importance of continuous authentication and adaptive access management in creating zero trust environments.

Digital identities are the foundation of our digital society. But you need to have a governance strategy to rein in the chaos.

More information:

 

Access Management:

Have technical questions about Access Manager? Visit the Access Manager User Discussion Forum. Keep up with the latest Tips & Info about Access Management. Do you have an Idea or Product Enhancement Request about Access Management? Submit it in the Idea Exchange.

Identity Management:

Visit the Identity Manager User Discussion Forum if you have a question about NetIQ Identity Manager. You can keep up with the latest Tips & Info about Identity Management. Have an Idea or Product Enhancement Request about Identity Management? Submit it in the Identity Manager Idea Exchange.

NetIQ Identity Governance and Administration

Now you can about visit the NetIQ Identity Governance and Administration User Discussion Forum if you have a technical question. Stay up to date with the latest Tips & Info about NetIQ Identity Governance and Administration. And don’t forget, if you have an Idea or Product Enhancement Request about Identity Management, you can them in the Identity Governance and Administration Idea Exchange.

We’d love to hear your thoughts on this blog. Log in or register to comment below.

Labels:

Identity & Access Mgmt
Anonymous