{"id":5659,"date":"2021-09-07T20:42:11","date_gmt":"2021-09-07T20:42:11","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5659"},"modified":"2021-09-07T20:47:00","modified_gmt":"2021-09-07T20:47:00","slug":"identity-access-management","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5659","title":{"rendered":"Identity &#038; Access Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5659\" class=\"elementor elementor-5659\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3db3804c ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3db3804c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-229ce3db ot-flex-column-vertical\" data-id=\"229ce3db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ad9993a elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"6ad9993a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-38eb644c ot-flex-column-vertical\" data-id=\"38eb644c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-549076cc elementor-widget elementor-widget-iheading\" data-id=\"549076cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ risk awareness<\/span>\r\n\t        <h2 class=\"main-heading\">Control Who Has Access To What Across Your Enterprise<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2f84ee elementor-widget elementor-widget-spacer\" data-id=\"c2f84ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17fc9c79 elementor-widget elementor-widget-toggle\" data-id=\"17fc9c79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4021\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4021\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Why is Identity and Access Management Important?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4021\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4021\"><p>The average person regularly uses passwords to 27 systems. Within an organization, they also change roles multiple times while abandoning applications they no longer need. Sometimes they leave and there may be some accounts not disabled. Before long, an organization has lost visibility of the access they are granting, and the \u2018principle of least privilege\u2019 is a distant dream.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4022\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4022\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Integrating Simple & Integrated Sign-on for Increased Security<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4022\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4022\"><p>Identity Management software can go a long way to solving this issue. Integrating single and same sign-on across multiple applications and systems can simplify providing and retiring access when an employee starts, moves roles, or leaves the organization. Just taking care of Identity management will make your IT department\u2019s role easier and will improve your employee\u2019s experience while increasing security.<\/p><p>For organizations with higher security, more granular controls may be appropriate. This is where the Access management and the Identity Governance parts become relevant.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4023\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4023\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Manage Risk When Giving Access to Your Enterprise Applications<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4023\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4023\"><p>While identity management confirms to applications that an authorized person is logging in, access management, controls what that identity is permitted to do. For example, a sales person, when identified, is permitted to log into the company CRM but are they permitted to access their own customer\u2019s information, or should they be permitted to access every customer\u2019s information? Are they permitted to access a single record at a time, or access the entire database in one go? Minimize Employee Fraud and Protect Your Company\u2019s IP.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-179f2eb elementor-widget elementor-widget-image\" data-id=\"179f2eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1007\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/iam-1024x1007-1.png\" class=\"attachment-large size-large wp-image-2468\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/iam-1024x1007-1.png 1024w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/iam-1024x1007-1-300x295.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/iam-1024x1007-1-768x755.png 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/iam-1024x1007-1-720x708.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a7619bb ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7619bb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66ec6eb7 ot-flex-column-vertical\" data-id=\"66ec6eb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71ebe98a elementor-widget elementor-widget-heading\" data-id=\"71ebe98a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Drop us a line! We are here to answer your questions 24\/7<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34383174 elementor-widget elementor-widget-heading\" data-id=\"34383174\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEED CONSULTATION?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-148adcb1 elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"148adcb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/datasecc.com\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contact Us<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ risk awareness Control Who Has Access To What Across Your Enterprise Why is Identity and Access Management Important? The average person regularly uses passwords to 27 systems. Within an organization, they also change roles multiple times while abandoning applications they no longer need. Sometimes they leave and there may be some accounts not disabled. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5659","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5659"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5659\/revisions"}],"predecessor-version":[{"id":5664,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5659\/revisions\/5664"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}