Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
BECOME
A MEMBER
TODAY TO:
CLICK HERE
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

MEMBER
Sam Fernandez
Managing Partner
39
MEMBER
Jamie Stewart
Marketing Manager
0
MEMBER
Zachary Caruso
Business Pro Analyst I
202
MEMBER
Rodolfo Vargas
Consulting Manager
22
MEMBER
Latha Thamma reddi
SR Product and Portfolio Manager
293
MEMBER
Andrea Ridge
Sr. Quality Manager
42

Work From Home – An Application and Identity Management Guide | Part 1 - Evolve IP - ContactCenterWorld.com Blog

Work From Home – An Application and Identity Management Guide | Part 1

This is part one of our three-part series on work from home - an application and identity management guide. In this section, we’ll cover the ins and outs of identity and access management. Before we get into the meat of this write-up, we’ll start with a little baseline background.

Background

SaaS is exploding.  Unless you live on Mars, this is a pretty obvious statement!  But what isn’t perhaps as obvious is the gaping hole this explosion is causing in your IT security posture. In many organizations, Active Directory (AD), which used to control all access to company resources, now only governs 20% of applications while 80% of a user’s application load comes from a 3rd party like Salesforce.com or Concur.

That also means IT is no longer the linchpin to get applications up and running. If a user or group of users want to share files, they can have an app up and running in 5 minutes with a credit card. Similarly, when internal applications are not easy to use, the workforce is finding, they now have the power to go out and sign up for tools on their own.

IT is struggling to provide users with the flexibility to get tools the way they want them, while also trying to get their arms around provisioning, usage, and de-provisioning.

Identity and Access Management Defined (loosely)

It’s essential to define these terms before we dive into these two distinct functions within an IT security framework.

Identity Management – This refers to the process of assigning and then managing the attributes of a user.  Who are they, what groups they are a part of etc. For example, “This person is remote, part of the Marketing functional area,” and so on.

Access Management – This refers to the process of taking the above identities, or groups of identities and deciding what IT resources they have access to.

These terms are very closely related and often used interchangeably. This is likely because traditional IT environments where corporate assets have been housed internally have utilized Active Directory (AD) to address both of these dynamics.  Who you are and what you can access.

However, with the explosion of SaaS, AD isn’t able to perform these functions by itself any longer.

Identity Management

Solutions for identity management can be segmented into two buckets:

Here are a few of the options:

Traditional AD – Companies not yet “cloud-enabled” are using this tried and true structure, whether hosted on-premises or in some sort of private cloud environment.  It works great; it’s robust and very familiar and easy to manage.  But, it’s lacking when companies start venturing out to SaaS applications, and identities must be created and maintained at these providers individually; it’s extremely time-consuming for IT to create, manage, and audit.

Directory as a Service – Seriously … another DaaS??  In all seriousness, these are purpose-built solutions hosted by 3rd parties specifically for managing user identities.  They are often built to integrate with other cloud solutions like SaaS applications.  A great example of this would be Azure AD, which is very popular. Mostly due to the fact it’s given away for free in some instances.  These are great for companies that are entirely “cloud-enabled,” but they aren’t built upon full-blown AD.  So, companies that have any legacy infrastructure that requires full AD must maintain both.  And while these two can integrate with each other, it can only be managed using the full AD instance as opposed to the cloud directory instance since that’s the scaled-down version.

In part two of this series on work from home - an application and identity management guide, we’ll dig into what SSO is, how it works, and the three big considerations for why to use SSO. For a much more thorough dive into the work-from-home guide, follow the link above.

Source: https://www.evolveip.net/blog/work-from-home-an-application-and-identity-management-guide-part-1

Publish Date: July 13, 2020


2023 Buyers Guide Employee Engagement Solutions

 
1.) 
ContactCenterWorld

TopPlace2Work.com
Typical Problem!

In-house surveys can be time consuming, cumbersome at best and many staff often don't provide valid feedback as they fear ‘being too honest' with their employer for fear of retribution.

Even some 3rd party ‘managed' surveys can be challenging, costly and then there is no benchmark or significant value other than ‘managed by a 3rd party' approach, which leads to the problem of validity of data, security and integrity plus costs and time required by you.

The Solution!

TopPlace2Work is an easy to use program that allows you to gather valuable data on employee morale and engagement.

2.) 
Motivarnos

Motivarnos.com
Motivarnos helps your efforts in managing a constant recognition system that includes trivias, badges and competition elements that drives performance appraisal while agents have an encouraging environment.
 



View more from Evolve IP

Recent Blog Posts:
Hosted Unified Communications in a New Era of CareFebruary 10, 2022
Top Three Unified Communications Market TrendsNovember 23, 2021
Virtual Desktop Infrastructure (VDI) Workspace ExplainedOctober 26, 2021
Your Guide to Contact Center as a Service (CCaaS) with Microsoft Teams IntegrationOctober 5, 2021
3 Takeaways from the 2021 Gartner® Magic Quadrant™ for Contact Center as a ServiceAugust 24, 2021
Hybrid Work - 5 Keys to Building an Effective Hybrid WorkforceApril 5, 2021
Hybrid Office & Microsoft Teams Direct RoutingMarch 23, 2021
The Virtual Private Network (VPN) – Is it Dead?October 9, 2020
The Contact Center Solution for Covid-19 ChallengesSeptember 18, 2020
Compare VDI to Hosted Virtual Desktops / DaaSJuly 14, 2020

About us - in 60 seconds!

Join Our Team

Submit Event

Upcoming Events

The 19th AMERICAS Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
 11815 
Showing 1 - 1 of 2 items

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =