is a management system that can effectively control the access behavior and permissions of different types of users such as people or things, and can effectively control which people or things have permissions to access which resources at what time.
IAM is a necessary condition of digital transformation
the top-level design of organization informatization
an important supporting part of informatization management
Digital transformation needs a more flexible, easy-to-use, and highly scalable carrier of information platform. IAM effectively integrates information assets such as personnel, organization, processes, and data into the digital sharing ecosystem, and efficiently breaks through information silos.
Iterations
As enterprise-level management system software, it has experienced the development from point-to-surface, from a single module function to a comprehensive digital identity governance system, and from SSO->PKI->4A->IAM with the continuous change of business scenarios and the iteration of technology update.
-
SSO
Solve the problem of user experience, no specific category of users, realize a little login, global access, and no access control capability. -
PKI
Binding the identity of the certificate holder and the related key pair, providing the user with convenient ways such as certificate application and certificate revocation, and realizing the identity authentication of each entity in the communication by using the digital certificate and the related various services. -
4A
Focus on the user, authentication, permissions and audit, so collectively referred to as 4a; For internal staff, with personnel life cycle management; Have access control when the user logs on; Focus on permission management; User identity changes and access to information records can be audited after the event. -
IAM
Implement lifecycle management for employees, partners, customers, devices, applications, privileged accounts, physical devices, and more; Realize the single point of Service All In, and uniformly manage the applications of BS and CS in different categories and access to different browsers. Realizing the fine-grained permission management , API and data at the application level; Access control changes from static to dynamic, with real-time risk discovery mechanism and risk closed-loop management ability; Realize the identity ability for cloud service, enhance the user privacy management.
Changes and Value
One ID go across the network
-
Unified identity repository
-
Unified access and management portal
-
Automatic data synchronization
-
Unified authentication and authorization
-
A visual report shows who accessed what systems at what time
- Multiple identity repositories?
- Multiple access, management portals?
- Repeated data synchronization?
- Multiple applications multiple authentications?
- Manually counting identities and accessing data?
- Multiple authorizations?
Fusion Intelligent Trustworthy Empowerment
-
Improve efficiency
01- Unified authentication, authorization and audit
02- State Secret Algorithm
03- Eliminate orphan and zombie accounts
04- Reduce data leakage
-
Meet laws, regulations and policies
01- Cyber Security Law
02- Classfied Cybersecurity Protection 2.0
03-GDPR
04-SOX
-
Cost reduction
According to Gartner's data, a company with 10,000 employees can achieve a 300% ROI only through identity automation management, save $3.5 million in three years, reduce 14000hours of operation and maintenance time every year, and free up 6000hours of help desk time.
-
Guarantee security
01- Unified authentication, authorization and audit
02- State Secret Algorithm
03- Eliminate orphan and zombie accounts
04- Reduce data breach
IAM is for every industry
-
Transportation
-
Real estate
-
Government
-
Finance
-
Energy
IAM is the security cornerstone
of information construction in various industries
-
Manufacture
-
Power
-
Pharmaceuticals
-
Medical
-
Construction
-
Automobile
-
Media
-
Internet finance
-
Education
-
More