Clock IconFacebookLinkedInTwitteranalytics-iconBell LogoShapecollaboration-iconconsulting-iconcustomer-x-iconGplusHamilton Logo 2013 - white-trimmedPage 1ShapeIcon - Law Enforcement Copy 2e029support-iconsupporticontalent-icontraining-iconpath-1

Authentication and the Mobile Enterprise

Back to Blog

As more and more employees go mobile, using a next-generation IAM solution makes it convenient and easy to provide convenient yet secure access to resources while on the move.

Mobile technology can provide a huge productivity boost for workers, giving them more opportunities than ever before to stay productive from any location.

But for the IT department, this increased mobility potentially puts information at risk -for example, what happens if a device is misplaced or stolen?

But that’s not the only issue. Connecting wherever they happen to be using laptops, smartphones and tablets, workers now have the challenge of trying to remember a plethora of usernames and passwords.

Solutions like IBM Security Access Manager (SAM) have been designed to eradicate password fatigue for users. Enabling IT departments to provide a single sign-on facility that gives users streamlined and fast access to the enterprise applications they need.

Single sign-on - The benefits

According to Gartner, up to 50% of all Help Desk calls are user requests for password resets. That all adds to a valuable loss of productive time and a bucket full of frustration for users, to say nothing of the resource drain these calls represent for IT support teams.

With single sign-on (SSO), users just have to remember just one password to access all their applications - rather than having to log into each one individually.

From a user experience and productivity perspective, that’s a good thing. And IT teams are freed to focus on more strategic activities.

What about security?

Just because SSO can grant users automatic access to all applications doesn’t mean it has too. With solutions like IBM’s SAM, it’s possible to restrict access to applications based on time of day, user permissions and even their physical location – and gain detailed reports on logins and other events.

But that’s not all. IBM Verify, IBM Security Access Manager’s mobile multi-factor authentication capability makes it easy to keep resources out of the hands of cyber criminals if a device is lost or stolen. This new mobile multi factor authentication capability means the IT department can deploy convenient tools like biometrics – face recognition, fingerprint and voice authentication – to make it more convenient for users while adding an extra layer of access security.

But that’s not all. A strong IAM solution should also deliver continuous authentication throughout the user session. So when a user logs in from a known device and IP address and provides accurate credentials, they are granted access to an authorised resource.

All of which enables strong authentication and better security, but also a seamless user experience.

Final thoughts

Solutions like IBM Security Access Manager and IBM Verify are designed to help IT teams control access policies related to cloud, mobile and on-premise applications from one central appliance. Making it easy to streamline your access management systems and policies and establish custom connectors to popular applications on cloud, on-premise and mobile.

In our next blog, we’ll explore how today’s next generation IAM solutions can help companies drive highly effective identity management and governance across the enterprise.

If you’d like to know more about how to implement a holistic yet effective enterprise data security platform for your company, contact one of our IAM experts today