Making Provisions for ChangeBy Deborah Gage | Posted 2003-03-01 Email Print
WEBINAR: On Demand Webcast As identity theft and credential-based attacks escalate, organizations wonder how this can be when they're investing so much time and effort deploying identity and access management solutions. Despite their best efforts, identity has become the most consequential attack vector to the modern enterprise. Organizations are essentially outmatched by increasing identity risks.
Modernizing Authentication — What It Takes to Transform Secure Access REGISTER >
With today's tight corporate budgets, few businesses are committing to the millions of dollars that a full-blown identity-management system can require.
"Security is a shared service, like plumbing that has to run through an entire building," says Joe Duffy, a partner at PricewaterhouseCoopers. "All the bathrooms will need it, not just the one you finish first."
Nevertheless, integrators are not shying from selling partial solutions.
Such solutions should be accompanied by a well-thought-out plan, developed and executed by a person or group whose responsibility is maintaining corporate security, according to Randal Kenworthy, a senior business architect at consulting firm NerveWire. NerveWire breaks identity-management systems into four functional groups that could be implemented individually. Kenworthy designed an interactive calculator that works through the costs of each module. To download, click on the .XLS icon above.