The Wayback Machine - https://web.archive.org/all/20041208215620/http://www.entrust.com:80/identity_management/index.htm?entsrc=hp_solutions
Login | Support | Help | Contact Us

Solutions
Secure Identity Management

Secure Identity Management Solution


Organizations today need to extend access to sensitive corporate resources to an ever-growing number of employees, partners, suppliers and customers.

Effectively managing this increasing number of users is a challenge in itself. No two users have the same identity, rights and responsibilities; your technology environment is likely an uncountable mix of applications, platforms and data-types; and, the responsibility for deploying and managing identities on these systems is spread across your company, challenging you to keep identity data consistent.

Furthermore, unique identities are required for Web services applications and devices that undertake transactions both inside and outside of organizations. How do you ensure that only the correct applications are involved in a Web services transaction? How do you manage these identities in a cost-effective way? And how can you audit any of these transactions?

You need to manage who, or what application, has access to what parts of your business, how it is being used, and what you can do to make this access deeper and better. This is secure identity management.

Legislative Compliance

Your business is under intense pressure to deliver more effective corporate governance, driven by legislation as well as shareholder demands for increased accountability. Compounding this pressure are issues like information and identity theft that are impacting the way you do business.

The situation has led to several major laws - including Sarbanes-Oxley, HIPAA, FISMA and the California Data Security Act - that require the strengthening of internal controls and information security governance. More effective internal controls, including the use of centralized provisioning, strong authentication, and access control systems, can help organizations to comply with these hard hitting pieces of legislation while at the same time realize business benefits like reduced cost and increased service levels for users.

The primary reasons to implement IAM solutions are business facilitation, cost containment, operational efficiency, IT risk management and regulatory compliance. IAM also ensures a secure access control infrastructure. Roberta Witty,Gartner, Five Business Drivers of  Identity and Access Management, October 2003

The Entrust Secure Identity Management Solution enables customers to:

deploy comprehensive identity management security…

  • automated identity provisioning
  • flexible workflow and audit capabilities
  • strong user authentication to sensitive applications and environments
  • policy-based authorization and single sign-on (SSO) access control

and manage multiple types of identities…

  • users across the extended enterprise, such as employees, customers and partners
  • applications that require identities in order to complete Web Services transactions
  • devices, such as servers, VPN gateways, appliances, and routers, both inside and outside of the organization

across heterogeneous, complex environments

  • enterprise, including applications that are accessible over the corporate network or remotely via VPNs and WLANs
  • extranet, including Web and Web services applications

Learn more about the solution.

Contact us to receive more information, see a demonstration or place an order.

Contact Me!


Featured Resource
White Paper:
Opening the Door to e-Business
Press Releases
Entrust Internet Security Survey
Entrust Announces New Authentication Offering to Combat Identity Theft
White Papers
Countering Online Identity Theft
Entrust and Sarbanes-Oxley
Demo
Demo:
Entrust Solutions in Action
Customer Success
Pacific Northwest National Lab
Veterans Affairs Canada
Web Seminars
Countering Online Identity Theft: Entrust Internet Survey Results
Entrust & Oracle - Secure Identity Management
Entrust & Sun - Secure Identity Management
Reports
Meta Group: Securing Identity: Part 3
Aberdeen Group Spotlight
Solution Brochure
Entrust Secure Identity Management
Fact Sheets
Information Security Breaches Survey 2004
Site Map | Privacy Statement | Legal

Copyright 2004 Entrust. All rights reserved.