* Rolling out Avatier's identity management in a 10-phased approach I had the opportunity to sit down with Avatier CEO Nelson Cicchitto last week, always a pleasant task. Pleasant, because Cicchitto is one of the right thinking people among identity management vendors. In other words, he agrees with me! [That’s a joke, folks. Please laugh.]Nelson’s mantra is that the promise of identity management is fourfold:1. Reduced IT cost.2. Enhanced security. 3. Achieved compliance.4. Improved efficiency through automation. He points out that most so-called identity management “solutions” from the biggest players in the software business are often monolithic conglomerations of many disparate products that require extensive manpower, time and infrastructure to implement. His company also offers a fairly all-encompassing identity management software bundle – the Avatier Identity Management Server (AIMS) and its various modules. The difference is that Avatier almost insists on a phased rollout of the various parts of the suite.Cicchitto claims that by rolling out the easiest pieces first, you can essentially finance later deployments with the ROI and savings from the earlier ones. Now wouldn’t your CFO love to hear that!In fact, the company’s stated philosophy is: “Delivering comprehensive identity management is primarily a process, not a product, that relies heavily on unique business driven workflow rules. Successful organizations avoid trying to deploy all aspects of identity management at once, but instead deploy a proven phased and measurable approach from many vendors who only specialize in their product space.”Avatier’s architecture of a rollout makes fascinating reading, but it boils down to a 10-phase approach:* Self-service password reset.* Password policy enforcement and synchronization. * User deprovisioning.* User provisioning and role definition.* Self-service role matrix and rights management.* Meta-directory. * Enterprise reduced sign-on.* Multifactor strong authentication.* Web/enterprise access management.* Federated identity management.Note, in particular, that user deprovisioning is implemented before provisioning. Your security officer will love that.There’s certainly a lot to like about Avatier’s approach to identity management implementation. You should investigate. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe