Cool Solutions

Top Identity Management Concerns for Today’s IT Professionals


August 16, 2010 3:17 pm





Whether they’re working with partners, for clients or within their own enterprise, IT pros repeatedly face challenges keeping information, infrastructure and facilities safe. These challenges – or pain points – can take the form of setting up a consultant who requires read-only access to internal databases or granting employees access to the appropriate applications they need to do their job while also revoking a user’s access to applications when their role changes in the company.¬† And that doesn’t even take into account servers and networks that demand the highest level protection.

Here are a handful of security concerns identified by an Amplitude Research survey* of 353 network administrators. These ten pain points that IT folks help illustrate that no matter the size of the firm, the issue or Identity Access Management is a consistent concern.

  • Granting and securing access for remote consultants and employees
  • Identifying and replacing insecure protocols
  • Maintaining current virus definition
  • System updates and patches
  • Education of staff, management and consultants on proper access procedures
  • Tracking network logons and use
  • Maintaining regular password parameters and ensuring enterprise-wide use
  • Sharing data and files securely over both internal and external connections
  • Backing up, managing, retrieving and sharing logs securely

Enterprise security – and the methods and software used to monitor and ensure it – impacts every business in different ways. But by recognizing some of the issues faced by many global organizations, most IT departments and professionals can take steps to ensure that their systems are secure, reliable and accessible.

Learn more about network and enterprise security as it pertains to identity and access management at .

IDM 4 is touring the USA. Come to a special briefing with top industry leaders and IT professionals in a city close to you.

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this post.

Tags: , , , , , , , , ,
Categories: Expert Views, General, PR Blog


Disclaimer: This content is not supported by Novell. It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test it thoroughly before using it in a production environment.