Identity and Access Management (IAM) is the discipline of determining policies for who has access rights to information assets in an organization, the issuing of these rights, and the implementation of the consequent access controls. It is at the heart of information protection, and of compliance programs with all regulations that control access to information.
IAM provides an easy to use and consistent user experience and mobility, whether between workstations within a building, or between working locations.
Automated processes, extending beyond the enterprise walls, require a pervasive access control mechanism that recognizes corporate entities and other processes as having equivalent access control needs to those of human users.
IAM is a key issue for the business. Implementing a system represents a major investment and its deployment will require changes in business processes to capitalize on its benefits. Successful projects provide a high return on investment and a payback period of less than two years is frequently achieved.
IAM is a useful, if not absolutely essential, tool for satisfying the more demanding regulatory and compliance requirements. It provides the audit and reporting functions to determine, with a high level of confidence, “who has done what” with critical information.