Quick Links
Advertise with Sarbanes Oxley Compliance Journal
Features


< Back

Sarbanes Oxley : Technology : Identity Management

Can Building ID Management and Security into the Business Infrastructure Propel Business Success?


By Hasan Rizvi
Hasan Rizvi
VP Security and Identity Management
Oracle

The Internet is changing business processes at an amazing rate. Today, we are seeing businesses that have already achieved significant success with traditional business models using the Internet to help them find ways to extend their competitive advantage. Companies are also learning that online business is not a separate entity but an integral part of their overall operations. In order to be successful, companies should not only be using the Web as a new means to market but also as an enabler for extending influence and building relationships with partners, suppliers, influencers, and customers.

Another significant change that we are seeing within companies is the move towards a business model that is information, rather than system centric. More and more, we are seeing businesses revamp their once closely guarded networks-turning them into collaborative environments that connect employees, customers, partners and suppliers.

However as the virtual reach of a company becomes larger, so do the risks. Improving access to information and building an environment in which business critical information can be accessed from any number of devices from any location, globally, means a significant increase in the risk of sensitive information falling into the wrong hands. The challenge companies now face is how to maximize the opportunities the Web-based environment offers while minimizing the risks.

Traditional IT based security measures have focused on protecting information within the physical boundaries of the business. However, the Internet has effectively removed these barriers, and therefore, hugely increased the complexity of information flow. The concept of keeping information between four walls and controlling access to it, is no longer applicable.

This view of security also means it is usually seen as no more than a necessary evil; however, architected correctly, ID management and security solutions can actually become a business enabler - creating a trusted virtual environment that gives employees, partners and customers the freedom to collaborate and do business regardless of location or IT environment.

Bringing Stakeholders into the fold In today's global business environment, companies need people to interact, collaborate and transact with one another. But to do this successfully and securely, stakeholders must be able to identify whom they are dealing with.

The concept of verifying identity has never been simple. Despite being widely accepted forms of identification, we are all aware of the fraud associated with passports and drivers' licenses; concerns over the protection of identity; and the security of sensitive data multiply when the electronic world is added to the mix. However, by building ID and access management into the infrastructure, technology can actually become an enabler - allowing companies to push the boundaries further without increasing the risk to the business.

The threat that companies face is not just to their infrastructure. Therefore, it isn't just the infrastructure that needs protecting. Information is a company's most valuable asset. Traditional forms of security focus on a specific function or application. When identities are handled on a per application basis, gaps are created that could potentially put information at risk. However, by treating identities as a fundamental piece of the infrastructure, they can be exposed and consumed by multiple applications or systems. The investment made in building ID management into the infrastructure, typically yields sustainable returns in the long run.

Another consideration is modern organizations need an ID management solution that enables one company with its own security domain, to seamlessly interact with another company - which invariably has its own security environment.

Breaking down borders between businesses and stakeholders, for example partner businesses, can certainly facilitate business growth, but it poses its own set of problems. The key is a balance of control: to make information, processes and systems available without compromising their security. Adherence to known, proven standards in areas like identity federation and Web services security is wise, when requirements for integration beyond the firewall boundaries proliferate.

There are plenty of arguments for an inherent and universal ID management solution, but the speed of change in terms of the way we use information and how we access it is a particularly strong one. Software and applications continue to evolve. Companies need a flexible, interoperable solution that can serve as a foundation for a broad identity and access management infrastructure.

Solutions that do not offer the integration and interoperability required, or do not support open standards, and require a company to lock-in to a technology, will likely fail at addressing the long-term needs of the organization.

In the modern business environment, flexibility and agility are key. ID management and security can be an enabler, allowing businesses to stay ahead of the curve in a fast moving market. By building ID management and security into core infrastructure, companies can continue to increase their reach, while ensuring valuable stakeholders remain close to the business.





Hasan Rizvi
VP Security and Identity Management
Oracle
Hasan Rizvi, vice president, Identity Management & Security Products, Oracle As vice president of Identity Management and Security Products at Oracle, Hasan Rizvi is responsible for the company's Identity Management and Security product development, product management and architecture. His area of responsibility includes Access and Identity Management, User Provisioning, Web services security, LDAP Directory and Audit and Compliance products.




About Us Editorial

© 2019 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY