Identity Account Management solutions focus predominantly on the management and business processes associated with user accounts. These solutions are focused on increasing security, whilst streamlining the management and business processes associated with the provisioning, deprovisioning, and ongoing life-cycle maintenance of user accounts within an enterprise, as well as outside of the enterprise in cloud applications.
Enterprise Identity Management
Enterprise wide user provisioning and data synchronisation enable organisations to manage user information in an automated, secure, accurate and efficient manner.
When applications exist independently of each other, an organisation often needs to manage user accounts and information separately through manual processes. These manual processes are slow and prone to error, which decreases productivity and accuracy and is a common source of internal security breaches.
Through the identification of authoritative systems (e.g. HR or AD) an enterprise identity management system can assess a user’s details and automatically (de)provision accounts, synchronise information changes and trigger workflow processes.
Traditional identity management solutions have focused on breaking down silo-ed and independently managed applications within an organisation. Integrating business rules and employee life-cycle activities with software applications has allowed organisations to function in a more efficient, cost effective and secure manner.
The adoption of cloud based technology can reintroduce silos into an organisation. A cloud application becomes a system that needs to be independently managed in regards to credentials, account creation/removal and privilege management.
Cloud provisioning solutions allow user accounts to be managed in an automated manner that corresponds to the organisation’s business rules.
Privileged Access Management
Privileged Access Management (PAM) solutions allow an organisation to manage accounts that hold elevated permission to access files, install and run programs, and change configuration settings. They exist on virtually every server and desktop operating system, business application, database, web service, and network appliance in your organisation
Privileged Task Management
More here ..................