eviden-logo

Evidian > Products > Evidian Identity Governance and Administration > Private Cloud Identity and Access Management (IAM)

Private Cloud Identity and Access Management (IAM)

Identity & Access Management:
avoiding binary choices

Sharing an IAM in a private Cloud

As a major editor of Identity & Access Management (IAM) solutions we are witnessing an increasing need for adaptive and agile delivery models in the IAM sector.

Today, organizational structures can be very complex. Large organizations are often split into separate business units which can operate very differently. To reduce costs and improve security and governance many organizations are now looking to harmonize processes across their entire business.

IAM for multi-entity groups: a new paradigm

In large groups, the smallest entities may not have the critical size to support in-house projects. The lack of human, technical and financial resources is the first hurdle for the implementation of IAM projects. ‘Classic’ on premise solutions can be too costly to acquire and own, and their implementation in every single entity would turn out to be overwhelming.

Today, one of the main IT trends is the shift from solutions hosted on premise to outsourced shared pools of configurable system resources and services, more commonly referred to as Software-as-a-Service (SaaS) or ‘Cloud’ solutions.

However, market experience and customer feedback has shown that many large companies haven’t made a decision yet when it comes to IAM. Many prefer to try to keep these services in-house to maintain control and worry about the lack of service levels from Cloud service providers.

A shared-services IAM solution is a “private Cloud” where the main advantage is that organizations only need to buy a unique license for a solution that is centrally hosted and administered. Capital expenditures are shared and operational expenses optimized.

Various degrees of freedom

This type of project is also able to meet the demands of individual business units by allowing some flexibility on governance and IT.

Depending on the degree of freedom the leading entity grants to its business units, it sets the degree of customization of the solution. The configuration scope can go from only shared machines and software to a fully configured IAM solution with strict governance and unique processes.

After defining the functional scope of the solution, the implementation team assesses the technical specifications for the physical architecture necessary to the project. The functional distinctions between subsidiaries and the degree of customization allowed will impact the identity, the application and entitlement attribution life-cycles as well as administrative function.

The goal at this stage is to ensure the long-term sustainability of the solution and avoid the technical debt that could derive from a too high level of customization. The success of a shared-services IAM project relies on strong governance and the full engagement of the main stakeholders across all entities. Capacity to execute must be optimal to harmonize processes and manage change.

An adaptive approach

This type of delivery model is not new but tends to be overlooked as SaaS IAM solutions are now on the market. It provides an answer when a completely outsourced solution doesn’t meet customers’ needs.

We can avoid binary choices and be more flexible with solutions that meet the needs of those who would want on premise solutions but need the scalable and adaptive approach of Cloud.

Contact us to know more...

Evidian Products - Protect your company from cyber attacks by unauthorized users

Orbion

Evidian takes care of everything related to your Identity and Access Management with Orbion (Identity as a Service)

Learn more   >

Identity Governance and Administration

Manage access and authorization of all your users in your company

Learn more   >

Web Access Manager

Gateway for web apps with SSO, multi-factor authentication, identity federation

Learn more   >

Analytics

Monitoring and powerful reporting for regulatory compliance

Learn more   >

Authentication Manager

Authentication Manager

Enterprise multi-factor & passwordless authentication on Windows PCs

Learn more   >

Enterprise Single Sign-On (SSO)

Secure access to legacy and web apps on PCs & mobiles with SSO

Learn more   >

Self Service Password Reset (SSPR)

Reset Windows passwords online and offline

Learn more   >

SafeKit

High availability software for critical applications

Learn more   >

Evidian IAM leader in the French and German markets and in U.S. Public Sector

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in France

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in Germany

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in U.S. Public Sector

What are IAM cyber security tools and solutions?