Identity, Credential, and Access Management (ICAM) is a critical foundation for any strong security program. In most IT models, both identity and resource access are considered and managed from an application or application-suite perspective. This perspective, and the assumptions it relies upon, are wholly inadequate to support contemporary identity and access management objectives.

Smart cards, PKI authentication, Single Sign-On, and Role-Based Access Control (RBAC) are important elements in raising an organization’s security posture while improving the user experience, but without an effective enterprise identity and access management strategy, these programs inevitably falter.

Recent IT developments and methodologies such as Service-Oriented Architecture, and SAML 2.0 federations, create tremendous opportunities for improved IT capabilities but require new models and ways of thinking about identity, credentials, and entitlement management.

Cyberström has considerable knowledge and thought-leadership experience in leading edge federal and state government ICAM initiatives including HSPD-12, and FICAM.

info@cyberstrom.com  ©  Cyberström, LLC  2012