Authentication lies at the heart of security — ensuring that only authorized users can access relevant data is the basis of keeping data safe and companies compliant. This is the role of identity and access management (IAM) systems. But in recent years it has become increasingly difficult.
“It is no surprise to any of you that most prevalent Identity & Access Management (IAM) deployments are failing to cope with new pressures introduced by rapidly changing infrastructure and unprecedented churn in users and computing devices,” blogged Nirav Mehta, EMC/RSA’s director of product management responsible for IAM. “The single biggest factor contributing to this is the lack of identity intelligence and business context at the heart of IAM deployments.”
He was welcoming Aveksa to EMC. Aveksa has demonstrated, he said, “that IAM can be performed in a fundamentally different way that involves the line of business in the identity life cycle (joiners, movers, leavers) and enables the organization to scale IAM deployments massively without introducing significant risk of incorrect access permissions.