14.05.2014 12:00-13:00

European Identity & Cloud Conference 2014
Combined Session


Identity Relationship Management: From IAM to IRM

Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees, customers, partners and devices, regardless of location. This is the evolution of IAM to IRM: Identity Relationship Management.

As more and more people, devices, and “things” are assigned identities across networks, IRM services that are simple, flexible, scalable and designed to quickly verify identities and access privileges, become imperative for any business to safely and efficiently engage with their customers. Today’s solutions must link devices–laptops, phones, touchpads, cars–and new mobile and social apps to a single security platform that works all the time, everywhere, on premises or off in the cloud. This is the standard that customers, citizens, and students expect, and CIOs and their businesses, (as well as governments and universities), must identify vendors that can provide it because these methods of consumer engagement directly drive revenue. Customers might deposit checks from their phone, order a service through a cloud app, or make a purchase from a laptop that recognizes their identity, and shares the right information with the vendor.

As consumers look for and expect more ways to engage with businesses, companies are making the shift from the closed, protective world of IAM to the open, evolving, and confidently secure IRM universe. This is because identity and access management tools are a necessity for managing trust relationships with parties inside and outside of a company – relationships that are now tied directly to the business’ top line.

Identity Challenges for the Extended Enterprise

The Open Group´s “Open Platform 3.0” initiative focuses on the collective business and IT implications of current, disruptive technology developments such as Cloud, Social Media, Enterprise Mobility, Big Data and the Internet of Things (the list is not exhaustive). When several of these technologies are deployed by multiple collaborating enterprises, using products from different suppliers (as is increasingly the case), the need for effective communication and standards is clear. The Open Group has established a new Forum to carry this work forward.

Identity, not merely for access management purposes is clearly going to be a key enabling factor, whilst at the same time obvious issues for privacy and information protection arise. In this presentation we´ll present the Forum´s perspective on the requirements and on how they can be met, but our interest is not merely to provide information. We want to engage domain experts and others with concerns or opinions in discussion about both the available standards and what needs to be developed. This session is therefore intended to be interactive. We hope to gain input from the participants that will contribute to the solution.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.