Verified Document

Insider Threats And Identity Research Paper

Identity Governance and Administration Case Study 3_Technology and Product Review for Identity Governance and Administration

While cyber security attacks are often executed by outsiders, insiders also present a major threat. Insider threats stem from, among other factors, user IDs and privileged accounts. This is particularly true at North-by-East Software, where controls over the issuance and management of user IDs and privileged accounts are considerably weak. The theft or loss of confidential information through insiders can result in disastrous consequences, underscoring the need for identity governance and administration (IGA) software. Indeed, in an ever more complex cyber security environment, the significance of IGA software is now greater than ever before. IGA software provides strong security controls against insider threats by enabling centralised identity management and access control (TechTarget, 2014). More specifically, the software enables privileged identity management, role-based identity administration, as well as identity intelligence. North-by-East needs a strong IGA product if it is to mitigate the threat posed by insiders. The firm requires a product that can effectively ensure least privilege and separation of duties.

IdentityIQ: Features, Capabilities, and Deficiencies

One IGA product that can be used is SailPoint's IdentityIQ. IdentityIQ can be used for identity management in mobile, on-premises, and cloud environments. It provides unparalleled integration with the wider information technology (IT) infrastructure. This integration is enabled by resource connectors incorporated into the base platform. IdentityIQ further enables enterprise users to effectively identify (detect), prevent, and control...

Indeed, detection, documentation, protection, prevention, and reaction are important pillars of information security. Without providing these aspects, an information security solution may not be effective.
IdentityIQ ensures centralised visibility of all information (applications, data, users, and access), thereby minimising or avoiding the threat of inappropriate access (SailPoint, 2015). Also, with its strong detection and prevention controls, the software ensures access is consistently within the firm's policy. Further, IdentityIQ empowers enterprise users by guaranteeing constant access from any device, including desktops, smartphones, and tablets. With capabilities for data governance, IT service management, mobile device management, user behaviour analytics, and privileged account management, IdentityIQ enables customers to make more informed security decisions in an increasingly complex security environment (SailPoint, 2015). These capabilities are supported by the software's unique features, including strong application program interfaces (APIs), a provisioning broker that readily integrates with third party applications, as well as unmatched analytics tools (Kannan, n.d.).

With its outstanding identity management capabilities, IdentityIQ has received fairly high user ratings, scoring 3.7 to 4.3 out of 5 in the categories of evaluation and contracting, integration and deployment, service and support, and product capabilities (Gartner, 2017). Users have particularly reported positive experiences with the software's pricing, flexibility, quality, and functionality. In addition to its robust cyber security capabilities, IdentityIQ enables enterprise users to minimise the cost of identity administration. Without…

Sources used in this document:
References

Crooke, M. (2015). IdentityIQ is flexible but customizing everything will add to your costs now and your maintenance later. Keep it simple. Retrieved from: https://www.itcentralstation.com/product_reviews/sailpoint-identityiq-review-31992- by-matt-crooke

Gartner (2017). IdentityIQ. Retrieved from: https://www.gartner.com/reviews/market/identity-governance- administration/vendor/sailpoint

Kannan, S. (n.d.). Overview of SailPoint IdentityIQ. Retrieved from: https://sbkannan.wordpress.com/knowledge-transfer/identityiq/

SailPoint (2015). SailPoint releases the first open identity and access management platform. Retrieved from: https://www.sailpoint.com/news/identityiq-7/
TechTarget (2014). Identity governance. Retrieved from: http://searchsecurity.techtarget.com/definition/identity-governance
Cite this Document:
Copy Bibliography Citation

Related Documents

The Insider Threat of Vishing
Words: 1104 Length: 4 Document Type: Essay

To:From:Date: 4/20/2022RE: Insider Threat � VishingBLUF (Bottom Line Up Front)A vishing attack is a major insider threat that could result in losses of billions of dollars for an organization because of unauthorized access to corporate systems. Multi-factor authentication mechanisms are the most effective approaches to prevent vishing attacks because they provide a wide range of security tools for an organization.BackgroundInsider threat is one of the common issues in the corporate

Identity Theft in America and
Words: 2851 Length: 10 Document Type: Term Paper

Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

Cyber Threats: Executive Summary It Is Important
Words: 1475 Length: 4 Document Type: Essay

Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in

Vose, D. 2008 . Risk Analysis: A Quantitative
Words: 1740 Length: 6 Document Type: Annotated Bibliography

Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd. The book is written on risk analysis using quantitative methodologies. The book has two parts and chapters are divided into these two parts. The first part is intended to help managers realize the rationale for conducting risk analysiswhereas the second part explains the modeling techniques of risk analysis. First part describes in detail

Briefing on Security Board Briefing on Security
Words: 2014 Length: 6 Document Type: Research Paper

Briefing on Security Board Briefing on Security Terrorism in Commercial Organizations Terrorism in Airlines Current Threats to Aviation Insider Threats Automation Adds Efficiency Improving Total Operations Increased Threats from Advanced Explosives Threat against Airline Services and Airports Necessary Steps to Improve Aviation Security Terrorism is the systematic use of terror. It does not have a legal binding or definition in criminal law. Commonly, it is referred to creation of fear through violence (Townshend, 2002). Terrorism is usually defined and assumed

Access Single Most Important Cybersecurity Vulnerability Facing It...
Words: 2445 Length: 8 Document Type: Research Paper

Cyber Security Vulnerabilities Single Most Important Cybersecurity Vulnerability Facing IT Managers Today Cyber Security Vulnerabilities Facing IT Managers Today At present, computers link people to their finances through online banking and a number of many online applications that offer access to accounts. In addition, they provide a connection to a broad variety of information, including social media, for instance, Face book, YouTube and Twitter. Interconnectivity of the systems have made it possible for

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now