In the current business arena, employees, consultants, and business partners come and go regularly. The need constantly grows for tightened security, accelerated user changes, and reduced operating costs. More people need access to more resources. Provisioning these resources and managing who gets what is a time-consuming process. Let’s discover how IBM Security Identity Manager can answer to these challenges.
To stay competitive in today’s economy, companies face difficult resource provisioning challenges:
• Maintaining absolute security by quickly eliminating inactive user accounts
• Remaining agile as they manage access rights among a growing number of business operating systems, each with its own access characteristics
• Addressing essential e-business initiatives quickly and efficiently, giving a growing number of customers, suppliers, and partners access to enterprise systems

With IBM Security Identity Manager you can efficiently, securely, and easily meet these challenges.
IBM Security Identity Manager allows you to automate and centralize access rights management and provisioning across all systems, applications, and databases in your enterprise.

Features:

• Automated provisioning of accounts and access rights
• Role-based access control (RBAC)
• Central control of privileged data
• Web-based system for easy privilege changes
• User self-service and self-registration
• Recertification system to revalidate users, accounts, and accesses
• Shared credential check-in, check-out, and management
• Integrated workflow engine to authorize users and accounts
• Report generation

Every organization is composed of two primary components: people and resources. As an IBM Security Identity Manager administrator, you must provide the people with access to the resources and deliver the resources to the people. Most organizations run various business systems to conduct business. The IBM Security Identity Manager administrator is responsible for provisioning access to these business systems to authorized users in the organization. These resources include:
• Email, examples: Lotus Notes®, Microsoft Exchange Online
• Systems, examples: Active Directory, AIX, and Linux
• Databases, examples: IBM DB2®, Oracle, and Sybase
• Applications, examples: PeopleSoft, and SAP
• Network resources, examples: file servers, network file shares, and printers
As with most organizations, provisioning these resources can be a time-consuming process, especially if they are manually provisioned through email requests, paper forms, and so on. Because of the overwhelming amount of requests, turnaround time for granting access to a new user can range from 5 to 12 days, if not longer. Even revoking access can take as long. In some cases, revoking access might never take place.

READ ALSO  Aurous, a Sptify-like app to stream Music!

In the next article, I will talk about ISIM architecture and dependencies, and we attack some advanced topics covered by the solution.

Learn more:

IBM Security Identity Manager: http://www-03.ibm.com/software/products/en/identity-manager

The following two tabs change content below.
Ayoub Bahar, 25 years old, founder of this blog, I am passionate about coding, hacking, cracking and everything related to the new technologies. Follow me to get my latest articles.

Latest posts by AYOUB BAHAR (see all)

Written by AYOUB BAHAR
Ayoub Bahar, 25 years old, founder of this blog, I am passionate about coding, hacking, cracking and everything related to the new technologies. Follow me to get my latest articles.