fbpx
Techitup Middle East
Interviews

Interview: Why Enterprises Shouldn’t Compromise on IAM & PAM

In conversation with P. Sathyamurthy, Sales Director, IDM TECHNOLOGIES as he discusses the pressing need of a strong IAM & PAM suite among enterprises.

Please tell us more about IDM technologies, the solutions portfolio, and your presence in the Middle East?

IDM Technologies has been able to provide a 100% Return on Investment (ROI) to our clients with abounding years of experience in delivering state-of-the-art Identity & Access Management (IAM) Services (IAM).

  • As dedicated specialists in IAM & PAM, our robust Center of Excellence (CoE) underscores our commitment to excellence and innovation
  • Our technological innovation is spearheaded by a passion for flexible client-facing designs, Simplifying Identity Security
  • While the global adoption of IAM & PAM spans over three decades, the evolving maturity of clients, changing budgeting priorities, and the potential of the addressable market inspired the inception of IDM Technologies. We pride ourselves on delivering a robust 99.9% uptime SLA
  • We share our expertise with various industry-leading technology partners and provide Advisory Services & Assessment, Professional Services, and Managed Services. Managing over 4 million identities
  • Our core team combines a long history of excellent experience within BFSI, Public Sector & Telecom. We are conversant in driving the adoption of disruptive technologies and modern Digital Identity solutions
  • We have an in-depth knowledge of over 50 complex enterprise use cases, for quicker deployment and integration (including customization), bridging the gap between OOTB and custom solutions without expensive OEM support
  • We ensure all your cost benefits while giving you value and worth for your trust
  • Our incubation of new businesses ranges from entirely new curated designs to rearchitecting existing projects for traditional on-premise solutions as well as today’s modern cloud-based stack

The Global IAM market is projected to reach USD 32.6 Billion by 2028, what opportunities are you seeing in the Middle East currently, especially with growing Hybrid adoption?

The customer’s understanding of the Middle East is at par with the mature markets, they are placing significant importance on addressing the growing concerns over Identity-related Security. We are also witnessing clients prioritizing and setting budgets, and are looking out for specialized partners who not only provide consulting but also help them with the complete roadmap from design to implementation and provide ongoing management. We are serving across verticals including BFSI, Public Sector, Telecommunications, Healthcare, etc., so the market potentials / addressable market for Identity Security is immense.

Identity theft is a growing concern in this digital landscape, how are you addressing this for your customers and what can businesses do to strengthen/protect their IT environments?

One of the weakest links in login credentials is the password; a weak password or the same password to access applications are easy pickings by the bad actors. Major breaches that happen usually are password-based. Therefore, by eliminating completely the need for passwords by incorporating biometric-based authentication via QR-based, facial recognition, gesture – passwordless authentication. Deploying these solutions, will give an instantaneous user experience, increase security posture, and lower the risk of password-based compromises.

Can you talk about a project in the Middle East where IDM has addressed pressing pain points for a customer? Of course, only if you can share.

A leading transportation company selected IDM Technologies to provide comprehensive state-of-the-art Identity & Access Management (IAM) solutions and services.

The business challenges: With access rights to various applications handled manually, user management was a difficult and time-consuming task at the company. The organization lacked a consistent set of enterprise-wide processes and platforms resulting in revision-safe administration of access rights becoming a challenge in the increasingly regulated environment.

A simple request from the business to give a new employee the same access rights as an existing one required the IT team first to determine the existing access rights, then laboriously apply them one by one to the new person. Equally, the difficulty in withdrawing access rights when an employee switched departments or left the company represented a potential security risk. The company wanted to standardize and, where practical, automate the provisioning & de-provisioning of users.

Most importantly, the company wanted to ensure easier and more efficient regulatory compliance. The company must comply with a large number of local and international regulations, including full auditability of access rights to data and systems.

The solution and key results: Based on priority and scope, IDM Technologies provided role-based provisioning for new users, user access reviews, Single Sign-On (SSO) services to both on-premise and web applications, Multifactor Authentication (MFA), and Passwordless Authentication. IDM Technologies also automatically deactivated user accounts when employees leave the company and modified accounts when employees change jobs within the company.

As businesses across the Middle East move ahead in their digital journey, how vital is a strong IAM suite for them and at what stage should it be implemented?

Both the maturing, demand, and adoption for Identity & Access Management (IAM) solutions by clients across the region be it medium to large enterprises including retail, banking, education, telecom, transportation, utilities, energy, and related public sectors, are towards the north. We are witnessing several technology partners, solutions providers, and systems integrators capitalizing on this growth opportunity and focusing and committing to our region. However, we need to continuously educate and advise clients on the approach, methodology, and prioritization in order for a successful journey. Therefore, it is recommended to start with consulting engagement / advisory services & assessment, enabling the client to have factual information about the current state, gap, and future state, capture the key use cases, technology partner fit, service timeline, effort estimation, and related details. This study will enable setting a realistic budget, setting the value with the Management, assigning the team, planning for scheduled roll-out, etc. Identity Security is a very long journey, and clients looking to embrace do not have to think and wait any longer.

Related posts

Interview: ‘The Future of IT – Rethinking Digitalization for an AI Everywhere World’

Editor

Interview: Data Poisoning and its Impact on AI Systems is Real

Editor

Interview: SOC Insights, Empowering Security Analysts

Editor

Leave a Comment