We’re Focused on Having Impact — Starting with These 5 Areas:
Designing the Next Generation of Identity and Access Management Tools
The larger an organization’s connected workforce, the more difficult it is to manage who can access applications and proprietary information. When identity and access management is too cumbersome, users complain and productivity suffers; when it’s not stringent enough, the organization may face growing security threats.
We’re exploring new and more effective identity and access management technologies, such as single sign-on, computer access cards and other application management provisioning solutions. Our goal is to address two objectives that are sometimes in conflict with each other: streamlining the process for users and administrators, while continuing to ensure that only authorized users can log onto protected networks and use specific applications and resources.