[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2013/05/22 15:45:09

Adaptive IAM: Defending the Borderless Enterprise Adaptive systems of IAM: protection for the enterprise without borders

The task which is carried out traditionally by the solutions IAM is an ensuring access of the corresponding users to the appropriate corporate resources. Today the new splash in interest in the solutions IAM as to a possible method of further gain of security of the modern expanded and not having borders of corporate environments is observed. However the traditional solutions IAM just should pass a certain way of development to provide support of the growing number of users, partners and cloud services which use the end devices and applications which are often dropping out of the sphere of direct supervision of corporate IT departments for access to corporate resources. The IDM/IAM systems directory and projects is available on TAdviser

In the overview of RSA technology (spring of 2013) the concept of adaptive system of IAM which in the next several years transforms the traditional IAM systems to more dynamic, flexible, intelligent systems capable to consider and estimate risks is entered. In conditions when corporate systems of identification constantly are exposed to the increased danger, one successful transaction of login is not good cause for trust any more. Level of control of security should be adjusted on the basis of each transaction, parties concerned and information resources put risk. The adaptive system of IAM will control situational perimeter which will compulsorily activate necessary security measures at each access for users to corporate data and resources.

The adaptive system of IAM is defined by four new characteristics:

  • Expanded user profiles are used for comparison of actions and behavior of users in real time with a historical basic indicator therefore essential deviations from "normal" behavior, testimonial of existence of problems with security come to light.
  • The analytics of Big Data is applied to massive data sets to risks assessment and distinguishing of the "normal" and "deviating" behavior.
  • Functions of monitoring and intervention on the basis of risks assessment monitor actions of users after passing of initial authentication and adjust access control facilities according to the calculated risk level. Work of users is interrupted by requests of additional authentication only in case of detection of unsafe actions.
  • The interface of consumer level assumes that control of identification and risks assessment should be executed imperceptibly for the user, without interfering it with work and to be visualized in the interface only if necessary.

The IAM systems of the next generation will allow to create the unified idea of users capable to consider increase of number of users due to use of cloud and mobile platforms, and it is better to identify attempts of access and malicious fraud to corporate resources, and all this is reached with the minimum influence on work of normal users. According to forecasts of RSA, adaptive systems of IAM in the future will become a key component of programs of security based on intellectual algorithms and will help the organizations to provide protection of valuable corporate resources and identification data in the heterogeneous environments integrating the entrusted and not entrusted IT infrastructures.