Identity Protection & Governance
It’s no secret that identity theft is a serious problem. Annually, there are billions of identity theft attacks and millions of victims. Identity theft can result in loss of time & money, and can even have lasting emotional effects. For organisations, it could potentially result in loss of sensitive information, intellectual property, reputation to name a few.
Our identities are made up of everything we say and do in our lives, recorded as data that spans across a sea of applications and services. While this delivers great utility, if we don’t maintain good security hygiene our identities are at risk. And over the last few years, we have seen identity become the battleground for security.
Identity Protection tools use the learnings acquired from their position in organisations and the consumer space to protect user accounts (Identities). It analyses trillions of signals per day to identify and protect end users from threats. Identity Protection allows organisations to accomplish three key tasks:
-
Automate the detection and remediation of identity-based risks
-
Investigate risks using data points
-
Export risk detection data to other tools for further analysis and action
Identity Governance allows you to balance your organisation's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources at the right time.
Identity Governance products differ from Identity and Access Management (IdAM) systems by not only enabling organisations to define, enforce, review and audit IdAM policies, but also map IdAM functions to compliance requirements and in turn audit user access to support compliance reporting. Several government-mandated compliance regulations require organisations to log systems/data access to stay compliant.
Typical Identity Governance product features include user administration, privileged identity management, identity intelligence, role-based identity administration and analytics. It gives organisations the ability to do the following tasks across employees, business partners, vendors, and across services and applications both on-premises and in the cloud:
-
Govern the identity lifecycle
-
Govern access lifecycle
-
Secure privileged access for administration
Specifically, it is intended to help organisations address these four key questions:
-
Which users should have access to which resources?
-
What are those users doing with that access?
-
Are there effective organisational controls for managing access?
-
Can auditors verify that the controls are working?
Azure Active Directory Premium has the above listed capabilities. If your organisation has already invested in it, or is evaluating it, we can help!
Contact us to get started.