What to Look for in an IAM Solution

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Set It and Forget It: Dynamic Password Management

People are notoriously bad at creating and then remembering multiple strong passwords, and as Intermedia's research shows, employees often take passwords with them – putting their previous employer at real risk. In light of that, IT teams should take the responsibility of creating passwords out of the employees' hands and in fact not even let employees know their corporate web application passwords, beyond their one master password.

Dynamic password management technology creates a unique, strong password for each of a user's corporate web applications and changes it on a pre-defined scheduled basis. Employees never know what those passwords are — they simply log into their SSO solution and the system logs them into all their web applications. This ensures that employees cannot log into those systems outside of work and take confidential information without the company's knowledge. And, most importantly, it means they can't take their passwords to corporate web applications with them when they leave the organization.

A study conducted by Intermedia last year found that the average employee relies on 13 different web applications at work, each requiring a different password. It also found that 89 percent of working adults retained access (i.e., a valid login and password) to at least one application from a former employer. More concerning, 45 percent retained access to "confidential" or "highly confidential" data, and 49 percent logged into an account after leaving the company.

With these realities in mind, identity and access management (IAM) software is increasingly necessary for businesses of every size to combat potential data breaches to data and IT systems. IAM is not only about single sign-on (SSO): A range of new and advanced capabilities greatly increase security while improving employees' productivity. In this slideshow, Intermedia highlights the top five features business should look for in an IAM solution.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.