Security Technology Executive

MAY-JUN 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/994589

Contents of this Issue

Navigation

Page 27 of 79

28 SECURIT Y TECHNOLOGY E XECUTIVE • May/June 2018 • www. SecurityInfoWatch.com CRITICAL INFRASTRUCTURE repeated manual data entry at each stage in the process for defining and granting access permis- sions. The risk that unauthorized users can access active credentials is minimized because the system generates and enforces well-defined procedures for issuing and revoking badges. The PIAM system also facilitates enterprise-wide audits of access privileges so that an organization knows it is compliant both with their internal policies as well as those mandated by external regulatory bodies. These PIAM capabilities will solve a number of difficult challenges. Organizations struggle today with evolving technologies, fragmented systems, and difficult decisions about whether to lease or buy facilities, so the traditional way of managing access control on a building-by-building basis has become extremely challenging in this environment. Adminis- trators must issue separate credentials to employees and contractors depending on their destination, the underlying PACS system there, and the permissions that must be managed. PIAM software solves these problems by enabling an enterprise-level people-centric, (rather than building-centric), view of identity management, for today's more fluid and flexibly deployed workforce. In other words, in the same way, that HR systems support the entire workforce regardless of location, PIAM software extends this approach to the security function. Organizations can manage all employee identities with a single PIAM solution, and issue a credential across all buildings, systems, permissions and associated workflows, regardless of the underly- ing access-control system. Even in the rare instances when there is common technology across all sites including those that have been acquired, there is still the need to tie the access control system into other systems for visitor man- agement, and to integrate with the HR system for identity checking , background checks and training compliance. PIAM software's ability to unify iden- tity management in this way helps make security invisible to users and more efficient, automated and scalable for the organization, which can now create enterprise-class self-service portals that simplify the process of managing badging issuance, replacement and other workflows. This approach is also far more automated and scalable across thousands of people. Another benefit of PIAM software is that it can help build a bridge between people and buildings. There will always be high value in an access-control solution layer that extends across all of the organi- zation's facilities and enables them to know who is working at each location and which buildings they can enter and interact with. With PIAM software, organizations have a single consistent way to man- age the underlying identity of each person — the collective set of attributes including name, location, manager, length of tenure, etc. — that define each person's identity within the organization. PIAM software ties everything together so that organizations can know that employees are who they claim to be as they move through multiple facilities and access their services. This approach is critical for creating an identity-aware environment in the Inter- net of Things (IoT) and can be further improved with biometrics for even greater efficiency and an opti- mized user experience. PIAM software will also help the industry prepare for a new era of identity analytics. It will enable data about user identities to be used not only for securing access to buildings and services, but also to optimize the user experience in an increasingly connected world. PIAM solutions are the ideal place to leverage analytics that helps identify current and emerging security threats while personalizing the user experi- ence based on his or her needs, habits and preferences. Moving forward, the more data about user access activities that PIAM delivers using digital and mobile IDs, the more effective organizations will be at thwart- ing cyber attacks, catering to user needs and maximiz- ing enterprise efficiency. Deep learning from analyz- ing behaviors, biometrics and predictive analytics will lead to minimum-downtime intention-detection ser - vices, seamless access solutions, optimized workflows and other artificial intelligence (AI) capabilities. Growing adoption of PIAM solutions will help organizations connect disparate physical and IT security systems, improving efficiency and security by standardizing identity management for employees, contractors, visitors, suppliers, tenants and vendors. PIAM solutions will enable organizations to adopt a more people-centric, rather than building-centric, view of identity management workflow, so they can create a seamless access experience across the enter- prise that helps make security more invisible to users. PIAM solutions will also provide the bridge between smart buildings and today's more fluid and flexibly deployed workforce, and pave the way for a new era of identity analytics that will improve security while enabling more personalized user experiences. About the Author: Julian Lovelock is V ice President of Quant um Secure - Identit y & Access Management Solutions (IA MS) with HID Global. » Today's PIAM products centralize the management of these tasks into a single administrative console. «

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018