Identity and access management (IAM) has traditionally focused on managing user information technology accounts in the enterprise. The rise of different types of accounts and identities such as cloud, mobile and other devices, e-commerce, and social networks has asymmetrically complicated provisioning and management. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. The result is fractured user authentication and authorization across applications and resources. There is not a single type of identity, identity token, or IAM that takes this into account. Identity management has very literally become identities management, and individuals and enterprises are struggling to keep up. In crafting IAM solutions to meet this evolving landscape, CIOs and those responsible for IAM deployments should take the following as given:
Today’s products give organizations the ability to automate the complete identity lifecycle of users from a business-driven perspective, helping turn traditional IAM systems into more situational perimeters that are agile, intelligent and scalable. Customers have a unified dashboard to manage, control, and deliver access, while consistently enforcing identity and access policies across the enterprise and cloud, at a granular level. These solutions help define rich user profiles and increase the convenience of managing user identities, allowing customers to continue building "situational perimeters" that can flexibly enforce security whenever and wherever users interact with corporate data and resources. The line of business gives easy and secure access to applications, while enabling them to take accountability and responsibility for making access decisions, within the controls, processes and policies defined by the information security organization.