Asia Pacific Security Magazine, July/Aug 2017

Page 30

Cyber Security

The keys to enabling digital transformation

A By Chris Cubbage Executive Editor

30 | Asia Pacific Security Magazine

2016 survey of global businesses found that 97 percent of respondents are investing in digital technologies to transform their businesses, yet only 18 percent reported that security has been involved in these initiatives. It seems security could threaten to slow them down. Yet the reality is when accessing and using digital technologies, organisations have no choice but to implement access and identity governance for on-premise and cloud applications. Given that cloud applications are a major component of any digital journey, we sat down with One Identity’s Richard Cookes, Country Manager for Australia & New Zealand to get a sense of the company’s own journey so far. In 2016, One Identity achieved license growth at three times the market rate and continued nearly thirteen consecutive years of profitability. With 700 employees working across 12 countries, the company sold its solutions to nearly 1,500 companies during the year, taking it to over 7,500 organisation clients. “We are a recent spin-off out of Dell EMC and were sold off as part of the software division, in November 2016.” Richard explained. “The software assets were put into Quest and acquired by private equity partners, Francisco Partners and Evergreen Capital. As of June 1, 2017, One Identity became a standalone entity”. With improved business agility, Gartner has positioned One Identity in the “Challengers”

Quadrant for Identity Governance and Administration . Despite the name, One Identity has a number of modular and integrated solutions. Prominent products are: providing identity management, called One Identity Manager, which involves provisioning and identity governance; Cloud Access Manager for access management, and One Identity Safeguard for privileged access management. Each of these is a separate product and customer profiles are commonly Tier 1 and Tier 2 enterprises with requirements across the entire range of identity and access management needs. Identity governance involves reviewing users to ensure they have appropriate access and still work for the organisation. Provisioning places users into the appropriate groups and roles used by applications and systems to determine access. Access Management assesses identity parameters, such as an IP address, group membership, location, time or device type when granting access to applications and systems. A significant driver of the One Identity business has been the standardisation of mobile device platforms and the need of line managers to approve and review access anytime anywhere, for example while in a meeting rather than returning to their desk. Privileged access management controls administrator access to systems via workflow approvals. Passwords are stored in a vault with access control based on predefined policy and ad-hoc approvals, including temporary access


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.