Page 44 - Cyber Defense eMagazine - September 2017
P. 44
The benefits of Authentication as a Service (AaaS) are the same as those of any SaaS product:
no need to maintain, update, upgrade, or install. But there are additional benefits as well. Unlike
CRM or BI solutions that have to evolve in accordance with user demand, IAM solutions must
meet both changing user demands and the changing threat landscape. Hackers are always
working to improve their techniques, tactics, and procedures, so an IAM solution needs to be
agile. Software that comes in a box or requires a team of project managers and engineers to
update is simply too slow and clunky to provide adequate protection in a world of dangers that
move at the speed of light.
Harden the whole company
Turning on an AaaS solution is as simple as signing a contract, but just as with any IAM
implementation, access needs to be planned strategically. Determining which members of a
trading circle need access to which services and data will lay the foundation for a successful
AaaS initiative. That said, something is better than nothing, so don’t put off adopting an AaaS
solution until your strategy is complete. The beauty of a cloud-based product is that it’s flexible,
so you can make changes as you evolve your program.
As everyone knows by now, security is not a technology problem; it’s a people problem. By
removing the ability of people to choose 123456 as their password, preventing the need for
them write down their passwords on sticky notes, and tightly controlling their activities once they
login, true proactive security can be established. A thoughtful IAM strategy is an essential
component of a holistic security posture.
About the Author:
Michael Brengs has over 23 years of experience in the software industry and has been
deploying identity management solutions since joining OpenNetwork Technologies in 2000
(acquired by BMC Software), and later with Oblix (acquired by Oracle). He is currently a
managing partner with Optimal IdM. Mr. Brengs attended the University of South Florida where
he earned an undergraduate degree in Management Information Systems. I highly recommend
you look at our solution, the OptimalCloud with a free trial. Secure, scalable and customizable,
the OptimalCloud is a complete Identity-as-a-Service (IDaaS) solution with delegated
administration and workflow capabilities that can be customized to meet the specific needs of its
clients. The OptimalCloud offers a private, secure and dedicated cloud which is essential for
meeting corporate security and compliance restrictions. The multi-factor authentication-as-a-
service offering allows customers to implement a variety of MFA solutions using their existing
on-prem or cloud federation solutions including time-based one-Time password (TOTP), short
message service (SMS), e-mail and push authentication. Further to that, The OptimalCloud’s
built-in cloud reporting system provides real time historical audit record of all activity including
detailed granular reporting which is stored in a dedicated private database. The OptimalCloud is
billed as an affordable, flat monthly fee which fits with budgetary and approval requirements.
44 Cyber Defense eMagazine – September 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.