Identity Relationship Management
Traditional identity management software is complicated, expensive and incompatible with today’s many connected devices. That’s why we’re introducing IRM, the evolution of IAM.
As more people, devices and things are assigned identities across networks, IRM services that are simple, flexible, scalable and designed to quickly verify identities and access privileges become imperative for any business to safely and efficiently engage with their customers. Today’s solutions must link devices—laptops, phones, touchpads, cars—and new mobile and social apps to a single security platform that works all the time, everywhere, on premises or off in the cloud.
Introducing the Pillars of Identity Relationship Management (IRM):
Traditional IAM platforms were designed for on-premises employee use and are unable to provide the quick, secure and device-flexible IAM experience customers are looking for. Modern identity management must manage access privileges for all stakeholders across a variety of devices.
Unlike traditional IAM designed for specific static events, IRM must understand contextual circumstances. For example, a user logging in from a different device or location should have access to the information they need.
IAM has always been viewed as a necessity for employees and therefore a business cost. In today’s world, the security system is used to authenticate and authorize both consumers and employees. If an IRM solution is efficient, secure and accurate, it can directly contribute to a business’ top-line revenue, as customers will have easy access to secure applications where they can buy services.
IAM has migrated from business cost to business driver. Companies suffer materially if their IAM solution takes too long to deploy, adapt or respond to user events. Employees had to put up with slow IAM systems, but customers don’t and won’t. Modern IRM serving employees, customers and devices must instantly react to variable circumstances and events, and must be massively scalable and available so that no user ever waits around—or worse—is shut out. CIOs today make IRM decisions based on speed, ease of use and the ability to scale to handle customer volume—not based on implementation and cost of deployment.
Today’s users access secure systems not just on premises, but in the cloud and via the Internet—any time, day or night. Today’s users are not just employees logging on at work, but also partners, customers and devices signing in from anywhere. As the number of users grows exponentially, modern IRM systems must be able to accommodate hundreds, thousands or even millions of additional identities instantaneously, achieving a scalable volume that was neither possible nor needed for the enterprise, but is essential in an internet-connected, consumer-facing world.
Traditional IAM was designed for a specific set of events—like employee on and off-boarding—taking place in a predictable on-premises work environment. Today’s IRM must understand the circumstances in order to determine whether or not you get access, and if so, how much and to what. If you log in from a new device or from a different country, for example, a modern, adaptable IRM system will adjust to the uncertain circumstances and ask you for additional authentication beyond a simple password.
Once upon a time, employees arrived at the office, logged into secure systems and logged back off at the end of the day. In today’s work-from-anywhere culture, employees, as well as partners and customers need access from laptops, phones, tablets and even cars. They access secure data stored not only on company premises, but also in the cloud and hosted by SaaS providers.
Today’s IRM demands are much more complex than those of traditional IAM. A good IRM solution is designed from the ground up as an integrated, cohesive stack that is purpose-built to handle complexity. Traditional IAM, typically built piecemeal through acquisitions and tacking on parts as needs arise, struggles to respond to the multitude of users, circumstances, devices, access points and access privileges that dominate today’s IRM world.
This is the standard that customers, citizens and students expect. CIOs and their businesses, as well as governments and universities, must identify vendors that can provide it, because these methods of consumer engagement directly drive revenue. Customers might deposit checks from their phone, order a service through a cloud app, or make a purchase from a laptop that recognizes their identity and shares the right information with the vendor.
As consumers look for and expect more ways to engage with businesses, companies are making the shift from the closed, protective world of IAM to the open, evolving and confidently secure IRM universe. This is because identity and access management tools are a necessity for managing trust relationships with parties inside and outside of a company—relationships that are now tied directly to the business’ top line.