The business world faces increasing demands to develop, both the demands of Digital Transformation, the demands of the application of Mobile and Cloud Computing, Collaborative Application demands both within the scope of corporate headquarters and subsidiaries between companies and their business partners (colleagues or vendors), etc. In the meantime, perhaps you want to know more about the multi factor authentication as well log me once.

The point that can be taken from these demands is that companies are asked to be more “open” from the outside world. Not only serving their employees who might work in remote areas or mobile, but also to serve access from customers, business partners and also contractors (vendors).

This openness leads to more “point of exposures” into the company’s IT system. That is, the security approach that has been carried out through the security of networks or IT systems based on endpoints, perimeters, networks or applications has become less effective and needs to be optimized. Because access to IT networks is increasingly open both from the media side, the target (application or data), and the user (accessor). So many changes have forced companies to become more open.

If the media has been protected if the target system has also been protected, why do violations or security breaches (security breaches) still often occur? And this applies equally in all areas, not only in certain industrial segments or in the size of the company’s class.

There are fundamental things that need to be reorganized, not just the registration of media that can access, not also packages or sites that may pass, and so forth. The fundamentals are the management and individual management of the user or access to every IT resource within the company, regardless of who is the accessor, both permanent employees, temporary employees (apprentices), contractors, business partners, even customers. The individual accessor then we call Identity. The fundamental term is known as Identity Governance and Administration which consists of Identity Access Management (IAM) and Identity Data Management (IDM). Fundamental arrangements and management of identity are based on IT resources that are accessed, both access to applications or IT resources (IAM) or more specific data (IDM).