Binod Singh CEO Ilantus shared enterprise CIO tips to improve productivity and efficiency. Ilantus recently announced Hosting Express – an IAM solution delivery framework to address the market needs.
With technologies such as BYOD, Cloud and Big Data, Identity and Access Management (IAM) continues to be the major component of security enforcement control, within an enterprise today. However there are many issues that continue to make its adoption and management a painful one. There is a dearth of solution providers, which provide solutions to address the complete lifecycle of IAM. There are a few vendors who offer solutions, but the solutions are partial as they lack experience and knowledge in the field of IAM.
Hosting Express solution offers enterprises the ability to address all IAM business challenges, such as user provisioning, access governance, password management, single sign on, web access management, federation, security intelligence and BYOD security – without any need for costly and complex on-premise infrastructure. It offers a comprehensive suite of features that enable organizations to take control over its IAM challenges cost-effectively, quickly, and with ease.
The latest technology trend is the private cloud model of deployment where customers have the ability to choose technology components, customized functionality and flexibility to decide the sequence in which they are implemented together with outsourced post deployment support.
Among the latest price trends, Pay per usage and cost-effective pricing models are the trend in cloud computing based solutions and IDaaS offerings.
The company has customers in sectors which include BFSI, IT / ITES, Manufacturing, Healthcare institutions. However, its product suite is applicable to any company that uses IT infrastructure such as Active Directory services etc. and IT systems.
Its main customers are Quattro, Gujarat Gas, iGate, HSBC, etc.
Its main products are Unified Express, Password Express, Sign on express and Hosting Express which was launched recently.
The Benefits of using our products are: 1) increased operational efficiency, user convenience and productivity, 2) secured cloud apps, compliance to regulatory norms with no technical complexity, 3) reduced sign-on across all web and thick client applications, 3) reduced password related help-desk calls and 4) single Sign-On to any web based on-premise or cloud application.
The company said it facilitates quick deployment and quick ROI in most cases ranging from 50-75 percent of the traditional deployment timelines.
Flexibility – Provides flexibility to define the order in which these technologies will be deployed and consumed giving enterprises total control over the investments. It also aligns with overall strategic direction, with the ability to add components as and when required
Security – Offers dedicated and secure hosted environments backed by industry certifications like SSAE 16 SOC1, SOC2 and ISO 270001
Comprehensiveness – Addresses every core and peripheral component of IAM lifecycle with prebuilt integrations, packages and deployment quick-starts
Quatrro says ILANTUS Password Express reduced the daily call center volume for password unlocks and resets from 80-90 calls to just a couple each day.
Gujarat Gas said after implementing ILANTUS Password Express, our users’ dependence on IT resources for password unlock and resets was nearly gone and we saw a noticeable impact in productivity in all departments, including IT.
iGate said by synchronizing ILANTUS Password Express and PeopleSoft, the existing HR software, all 28,500 users were able to be auto registered into Password Express and ensure that everyone was seamlessly using the new password management tool.
The major hurdle faced by customers is managing different passwords for numerous applications. A recent analyst reports indicates that 30 percent of helpdesk calls are password related. An average user has access to over 10 to 15 enterprise applications and multiple complex passwords to remember.
It is estimated that by the year 2017 an average user will have 3 devices to manage. With multiple devices to login into numerous applications, the login process becomes very cumbersome which in turn decreases the user’s productivity. The business landscape is seeing a paradigm shift arising out of global workforce, BYOD culture and proliferation of SaaS applications.
Password related call volumes are increasing, and user’s productivity as a result of interruptions is decreasing. Organizations are witnessing different on-premise and on Cloud applications, complex passwords and policies, an always remotely-connected workforce, and BYOD culture.
The main demand from a customer is for IAM products to be extremely easy to deploy with minimum cost involved when compared to the conventional solutions while ensuring that the security is not compromised.
1) Look for solutions that address the entire lifecycle of Identity and Access Management.
2) Keep in mind the long term and the latest technologies to cater to including cloud, SaaS, social identities and BYOD.
3) The ease of deployment, maintenance and support aspects should be carefully considered while selecting solutions.
4) Look at the value the products and services yield and match them with strategic and tactical priorities including operational efficiency, user and IT staff productivity and convenience
5) Return on Investment and TCO need to be considered while choosing the solutions
The emergence of the four powerful and disruptive forces: social, mobile, cloud and information and their convergence through consumerization and the ubiquity of connected smart devices, people’s behavior is changing the IT landscape in unpredictable ways. This is in turn rendering existing architectures obsolete.
As per Gartner in the Nexus of Forces, information is the context for delivering enhanced social and mobile experiences. Mobile devices are a platform for effective social networking and new ways of work. Social links people to their work and each other in new and unexpected ways. Cloud enables delivery of information and functionality to users and systems. The forces of the Nexus are intertwined to create a user-driven ecosystem of modern computing.
Organizations are grappling with the complexities of Identity and Access Management (IAM) technology, which result in high rate of failure of traditional projects. Adoption of cloud, SaaS, social identities, BYOD and mobile revolution is making the consequences direr. Within a globalized world, remote workforce is proliferating. Ensuring access to applications for these remote workforces is a top priority job for the organizations. Emerging advancements like Internet of Things (IoT) will only further complicate the design of an IAM solution.