RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

  
  
 |style="background-color:#b62828"| IAM IDM УИД 
  Identity and Access Management
Authentication Management Systems
Identity and Access Management
Authentication Systems
     The following tabs provide information about authentication systems used in Russia, as well as unique information about integrator companies and

their projects.

TAdviser Wiki Center invites the editor of the process block Authentication Information Systems.

Companies can register their systems and projects in the TAdviser/Authentication directory for free. The section is in online update mode.

       

Today, there are no operating systems and probably no applications that require access to some resources where the user does not have to go through the authentication procedure before starting work. Similarly, in local or distributed computing environments, network resources often require authentication from their "metal peers" or software environments. Authentication (from English - authentication) - verification of the identity presented by the access subject. Three types of authentication are most relevant: "person - computer," "computer - computer" and "person - person."


Using an IDM solution implies a full-scale corporate user role model. It takes into account all information assets of the enterprise, as well as describes the business roles of personnel and the procedure for access for each of them to each asset. At the same time, the harmonization of the model, as a rule, is very difficult due to conflicting requirements for it from different structures and divisions of the company.

The creation of a role model often leads to the need to change the business processes of the enterprise - a task much larger than the implementation of any IT or IB system. Often, participants in the implementation project accumulate such fatigue that they simply curtail it, without having implemented it on an initially conceived scale.

According to  Solar Security estimates  , the global IDM market is  estimated at $6.1 billion (+ 15% compared to 2013). According to forecasts, in 2015 the IDM segment will show positive dynamics at the level of 16%.

According to analysts, the days of regular passwords and pin-codes are numbered. For the foreseeable future, secure user authentication will not be possible without additional hardware such as USB tokens and fingerprint scanners. Used throughout the Internet, classic passwords are no longer meeting modern information protection requirements.

In the future, authorization methods using NFC technology may become common. In addition, Intel, AMD and Microsoft are actively promoting facial and voice recognition technologies to use them for customer authorization.

There is a need for IDM systems for all companies with more than 500 employees, since manual access control in such structures leads to high overhead and IB errors due to manual administration.



 

Шаблон:Main Technology