Identity & Access Management
What is it?Internet Access Management (IAM) allows you to identify users, authenticate them and control their network access. Strict access control measures have to be used in order to protect the security of your network and the integrity of your data and systems.
Why you need itIAM helps to reduce administrative costs and also remove security risks inherent with standard passwords. The ability for businesses to verify the identity of those attempting network access is essential for security and compliance considerations.
How it worksIn order to gain access to the network, users have to supply their credentials or another method of identification. If an attempt is made to access your network without the correct authentication, access is denied.
Access privileges can be set for individual users or groups of users and this determines what network resources can be accessed.
Authentication and authorisation policies are managed from a central location and synchronisation polices ensure user repositories are up-to-date in each office location.
Single Sign-On (SSO) can form part of an IAM strategy where organisations use multiple disparate systems. SSO allows users to securely log into all of these systems by providing a single set of credentials.