Security Technology Executive

MAY-JUN 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/994589

Contents of this Issue

Navigation

Page 25 of 79

26 SECURIT Y TECHNOLOGY E XECUTIVE • May/June 2018 • www. SecurityInfoWatch.com A mong the trends that are currently tracking strong for 2018 is the growing demand to unify identity lifecycle management so that multiple departments and teams can engage and collaborate through the full range of employee on-boarding , badging and access management activities. During a period when trusted identities are emerging as the fundamental building blocks for connecting an organization's people, places and things, Physical Identity and Access Manage- ment (PIAM) software products are playing a key role by enabling organizations to connect together the enterprise's multiple physi- cal access control systems (PACS) to other parts of its IT systems ecosystem, such as user directories and HR systems. As they do this, they are changing how organizations look at security and in particular how they manage identities. PIAM software works with existing hardware and infrastruc- ture to collect, collate, store, process and analyze identity and other data from multiple security and non-security solutions. By connecting into a variety of PACS systems across multiple sites, PIAM software standardizes the way organizations man- age trusted identities for their employees as well as contractors, visitors and even their suppliers, tenants and vendors. PIAM software also connects with HR systems as well as user directo- ries and systems for training management and other processes. It can also be used to tie in key external services for running background checks or verifying identities. Today's PIAM products centralize the management of these tasks into a single administrative console. PIAM reporting and analytics capabilities enable organizations to mitigate enterprise- wide security risks using consolidated data from many different systems. PIAM software also makes it easier to issue, manage and use a single credential across both physical and IT security systems for everything from opening doors to accessing networks, data and building services, eliminating the need to deploy mul- tiple solutions to achieve this capability. PIAM solutions dramatically streamline workflows by reduc- ing the internal email traffic that would otherwise be required for requesting and granting access. This improves operational efficiency while eliminating the errors that often occur with Unified Identity Lifecycle Management Solutions Will Change Security's View PIAM bridges hardware and infrastructure gap to create an analytic resource By Julian Lovelock PIAM software ties everything together so that organizations can know that employees are who they claim to be as they move through multiple facilities and access their services. Image Courtesy of BigStock.com CRITICAL INFRASTRUCTURE

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018