Sie sind auf Seite 1von 2

Comment Article

Straight Talking – ID tech tightens up compliance


By Fran Howarth, Principal Analyst, Quocirca Ltd

This can be done for all assets in an enterprise


Organisations are using identity management or, through use of federation standards, can be
systems to cut the risk of data security breaches. extended to applications hosted by business
That's a step in the right direction but they still partners or third parties without the need for
need a number of other measures. users to reauthenticate themselves when
accessing each resource.
Most CIOs have a list of compliance regulations
as long as their arm. At the top of that list sits Because a user now has, theoretically, just the
data protection - the single most important legal one user name and password combination for
issue by a wide margin, according to a recent accessing all the resources to which they are
Quocirca survey of 250 German, UK and US entitled, the onus is on organisations to ensure
executives. that the initial authentication event is genuine
and that it could not be an impostor who has
stolen these credentials. To provide an additional
No one wants to be the next TK Maxx, whose
layer of security, strong authentication
parent company TJX had more than 45 million
techniques are coming into wider usage.
customer records stolen by hackers. More than
60 banks around the world reported fraudulent
transactions based on the stolen credit card But even the most virtual of organisations has
data. physical assets of some sort - and many of these
assets are used to store or produce data, such as
storage systems and printers.
So organisations are turning to identity and
access management technologies. These
systems tie access to resources to the rights Organisations need to ensure such devices are
associated with a particular user or role. included in the identity management systems
they put in place - for example, by requiring
employees use a personal swipe card for
This technology lets organisations demonstrate
securing access to printers and photocopiers,
that effective controls have been placed on who
which can also provide an audit trail of all actions
can access valuable assets, enabling them to
taken.
prove they are protecting their data and meeting
the compliance mandates imposed on them.
Companies should also develop policies around
use of portable storage devices such as CDs and
The technology automates tasks such as
USB memory sticks and consider using
resetting passwords. But, as reliance on
technologies to block their use so that they
technology continues to grow, the number of
cannot be used to leak data out of an
passwords that users have assigned to them has
organisation.
mushroomed, leading not only to insecure
password management practices but also
causing many headaches for helpdesks that must There is also one further step organisations can
reset them manually - which is a cost that is take to make sure their security controls are
entirely avoidable. watertight - they can tie physical access controls
in with logical access to the corporate network.
This means they can not only ensure that a
This still leaves the problem of computer users
person is who they say they are but also can tie
having too many passwords to remember. To
identity to their physical location.
solve this issue, identity and access
management systems offer single sign-on,
whereby users authenticate themselves at one By converging physical and logical access
primary interface to gain access to all resources controls, access to the computer network can be
that they have been assigned the right to use. denied to all those who have failed to present

© 2008 Quocirca Ltd http://www.quocirca.com +44 118 948 3360


Comment Article
their security badge when entering the events through one centralised management
organisation's facilities. system.

Location-based authentication also means that This provides them with the ability to report on
access rights can be set according to the physical all access and authentication events and to
location of a user logging into the corporate prove who has accessed what, when, from where
network. and what they did with the information contained
in those assets.
For example, a user logging in from a remote
location using a VPN tunnel could be allowed to Because organisations are in the position to
access office productivity tools but denied access report on all events, they can prove through
to the customer relationship management audits that the actions they have taken have
system or financial records when they are not at been successful.
the office.
They can also show, therefore, through those
When all access controls - logical and physical - audits that they are complying with data
and authentication to all types of assets is tied protection regulations - as well as satisfying the
together in one identity management system, requirements of a number of other regulations
organisations can manage all authentication with which they must comply.

About Quocirca
Quocirca is a primary research and analysis company specialising in the business impact of information technology
and communications (ITC). With world-wide, native language reach, Quocirca provides in-depth insights into the
views of buyers and influencers in large, mid-sized and small organisations. Its analyst team is made up of real-
world practitioners with first hand experience of ITC delivery who continuously research and track the industry
and its real usage in the markets.

Through researching perceptions, Quocirca uncovers the real hurdles to technology adoption – the personal and
political aspects of an organisation’s environment and the pressures of the need for demonstrable business value in
any implementation. This capability to uncover and report back on the end-user perceptions in the market enables
Quocirca to advise on the realities of technology adoption, not the promises.

Quocirca research is always pragmatic, business orientated and conducted in the context of the bigger picture. ITC
has the ability to transform businesses and the processes that drive them, but often fails to do so. Quocirca’s
mission is to help organisations improve their success rate in process enablement through better levels of
understanding and the adoption of the correct technologies at the correct time.

Quocirca has a pro-active primary research programme, regularly surveying users, purchasers and resellers of ITC
products and services on emerging, evolving and maturing technologies. Over time, Quocirca has built a picture of
long term investment trends, providing invaluable information for the whole of the ITC community.

Quocirca works with global and local providers of ITC products and services to help them deliver on the promise
that ITC holds for business. Quocirca’s clients include Oracle, Microsoft, IBM, Dell, T-Mobile, Vodafone, EMC,
Symantec and Cisco, along with other large and medium sized vendors, service providers and more specialist
firms.

Details of Quocirca’s work and the services it offers can be found at


http://www.quocirca.com

© 2008 Quocirca Ltd http://www.quocirca.com +44 118 948 3360

Das könnte Ihnen auch gefallen