vpnversed.comvpnversed.comvpnversed.comvpnversed.com
  • Home
  • VPN
  • Windows
  • Contacts
  • Privacy Policy

SC Product Reviews: Identity & Access Management

  • Home
  • Identity and Access Management
  • SC Product Reviews: Identity & Access Management
SC Product Reviews: Identity & Access Management
February 1, 2021
SC Product Reviews: Identity & Access Management
February 1, 2021
Published by Katelyn Dunn at February 1, 2021
Categories
  • Identity and Access Management
  • Security News
Tags

Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected] This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…

The post SC Product Reviews: Identity & Access Management appeared first on SC Media.

Rate this post

Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]

This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The traditional, known perimeter has grown increasingly immaterial over the years. The unprecedented, world-wide scramble to work remotely has emphasized that the previously known perimeter is virtually non-existent.

These trying times have mercilessly highlighted a number of cybersecurity weaknesses across industries. It is our sincere hope that these reviews find our readers in a state of proactive due diligence instead of a post-incident scramble following a lesson learned the hard way. The identity and access management solutions reviewed here guard the proverbial gates of critical organization resources, checking the IDs of everyone that attempts to enter, ensuring identities match end-user claims and privileged access is sufficient for entry. Without this cybersecurity bouncer to guard the door to your resources, malicious actors have a free pass into critical applications and data.

Product Group Opener 

This month, SC Labs looked at a handful of products within the identity and access management (IAM) space, which collectively function as an enterprise gateway between end-users and critical organization information with centralized access control of cloud, on-premises and legacy applications and resources. The emphasis here is on the word collectively. Although these solutions nearly exclusively offer core capabilities such as authentication and authorization, the products we assessed are most effective when deployed alongside at least one other IAM solution. Several of these products already have built-in integration to support one another.

Onboarding users onto the platform, in most cases, is automated with a broad range of directory integrations. Bisynchronous relationships between the identity platform and supported directories takes the manual work almost entirely out of the hands of administrators and dramatically reduces the complexity of implementation and time-to-value.

Some of this month’s products may operate on the frontend with MSSP functionality while a paired identity and access management solution operates in the backend. This particular use case and type of deployment enables a seamless switch between IAM solutions without the need to retrain end-users. A third type of product, YubiKey (hardware), can add an additional layer of identity security functioning as a key to the backend identity and access management lock.

We see the industrywide trend of incorporating artificial intelligence and machine learning with identity solutions as well. Advanced features such as user behavior analysis enable dynamic assessments of, and responses to, varying risk at the user or session level. A baseline understanding of expected user behavior (time of day, IP address, location, etc.) enables the flagging of anomalous behavior.

Identity and access management products enhance traditional login credentials with various security capabilities including password management and analysis, single sign-on and multifactor authentication. Some of the solutions have password vaults so that end users may securely store enterprise credentials. Password management keeps tabs on the frequency with which passwords are reused and the inherent security of those passwords according to length and complexity. Single sign-on streamlines application and resource access serving as a central, unified login portal. This encourages end users to use long and complex passwords because only need to sign in once to access all an organization’s resources instead of having to log into every single individual resource. Some products even permit authentication at the workstation level.

Identity and access management products are vital to enterprise security across industries and greatly enhance existing security investments. In addition to bringing in an extra layer of security and going a step farther with data loss prevention, their capabilities and features can increase productivity and overall return on investment.  

Pick of the Litter 

Yubico YubiKey 5Ci offers the easiest and highest level of security available for an identity solution that is so consumer friendly. If there were an ease-of-use category, this would win by a mile. The one-touch YubiKey experience comes with a large ecosystem of integrations, a low total cost of ownership, and a substantial return on investment, making Yubico YubiKey an SC Labs Best Buy. 

Okta Identity Cloud is a flexible solution with an extensive integration network that covers every identity use case for any technology. Okta reliably and efficiently enhances productivity and security, driving profitability and growth to maximize overall return on investment and to reduce the total cost of ownership, making this our SC Labs Recommended product for this month’s round of testing.

June reviews

Auth0

JumpCloud

LogMeIn LastPass Identity

Microsoft Azure Active Directory (Azure AD)

Okta Identity Cloud

OneLogIn Trusted Experience Platform (TEP)

Simeio Identity Orchestrator

Yubico YubiKey 5Ci

Click on the chart below for the full-size version

The post SC Product Reviews: Identity & Access Management appeared first on SC Media.

Share
0
Katelyn Dunn
Katelyn Dunn

Related posts

February 2, 2021

Data on 3.2 million DriveSure clients exposed on hacking forum


Read more
February 1, 2021

Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs


Read more
February 1, 2021

The cloud divide: Risks and rewards for companies that moved pre-pandemic


Read more

Comments are closed.

Archives

  • February 2021
  • January 2021
  • December 2020
  • October 2020

Categories

  • About Reviews
  • Application Security
  • APT
  • APTs/cyberespionage
  • Botnet
  • Breach
  • Careers
  • Cloud
  • Cloud Security
  • Compliance
  • Corporate News
  • Critical Infrastructure
  • Cryptocurrency
  • cyberattack
  • Cybercrime
  • Cyberespionage
  • Data Breach
  • Data Protection
  • Data security
  • Database security
  • DDoS
  • DevOps
  • Education
  • Email Security
  • Encryption/Data Security
  • Endpoint
  • Exploit prevention
  • Featured
  • Financial-services
  • Firewall
  • From the Collaborative
  • Government
  • Government/Defense
  • Group Tests
  • Health Care
  • Healthcare
  • Home
  • IAM
  • ICS security
  • Identity and Access Management
  • Innovation
  • Insider Threat
  • Insider Threats
  • IoT
  • Leadership
  • Legal
  • Legal Action
  • Malware
  • Managed Security Services
  • Manufacturing
  • Mobile
  • Mobile Security
  • Network Security
  • Pen testing
  • Phishing
  • Physical security
  • Privacy
  • Privacy & Compliance
  • Privacy & Compliance News and Analysis
  • Product News
  • Product reviews
  • Ransomware
  • Regulation
  • Remote Access
  • Research
  • Reviews
  • Risk Management
  • Security awareness
  • Security News
  • Security strategy
  • SOC
  • Social engineering
  • Social Media
  • Software and solutions
  • SolarWinds hack
  • Third-party risk
  • Threat intelligence
  • Threat Security Intelligence
  • Training
  • Virtualization And Cloud-Based Security
  • VPN
  • Vulnerabilities
  • Vulnerability Management
  • Windows
  • Women in IT Security
  • Year in Review
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2021 vpnversed.com. All Rights Reserved