About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Conference paper
Privileged identity management in enterprise service-hosting environments
Abstract
■ IAM needs will only grow as devices, servers, and end points continue to increase • Current schemes are not sustainable as the number of ids will explode. ■ Environment is heterogeneous, and constantly adding new systems including Cloud. ■ Our solution offers a platform where: • A user gets an individual user ID on a system - but only... • If they need it • When they need it • For only as long as they need it • Re-Usable ID scheme reduces the number of IDs in the system yielding: • Cost savings on lifecycle management activities • Improved security compliance • A compliance readiness platform can be enabled to: • Prevent, flag, or monitor questionable access in or near real-time • Provide easily accessible logs to prove compliance policies. © 2012 IEEE.