Identity Management 2.0 – The Secret Revolution

Identity Management 2.0 meets the definition of a revolution. Certainly the circumstances driving the development of these 2.0 technologies can be described as revolutionary. The IT world is currently faced with an unprecedented era of governance, risk and compliance; increasingly sophisticated online attacks; and corporate consolidation from merger and acquisition activities.

The core platform of Identity Management 1.0 capabilities such as authentication, authorisation, user provisioning, password management and the like has provided a base for improving security and automating manual processes to drive down operational costs. Identity Management 2.0 extends the core platform to offer stronger forms of authentication, risk-based authorisation and fine-grained entitlements, user provisioning based on roles and relationships, as well as the ability to virtualise identities, all in an effort to address the next generation of requirements and threats.

The Bottom Line

The general Internet user population has witnessed the rise in online fraud attempts, and most people in the IT field have also felt the growing pressure to meet a mountain of regulatory demands brought on by stricter governance policies. Fortunately, there are some software vendors that have taken charge to introduce technologies that will keep companies ahead of the growing threat of online criminal activities and make it simpler to meet and exceed any regulation whether dictated by law or corporate policy. Identity Management 2.0 is this secret revolution of technology development, but make no mistake, this won’t be a secret for too much longer