!!! Overview[1] [{$pagename}] ([IDAM], [IAM], [IdMA]) is the [security] and business discipline that "enables the right individuals to access the right [resources] at the right times and for the right reasons". [{$pagename}] combines [Identity Management] and [Access Control]. Typically [{$pagename}] provides [Digital Identity] State to the [Organizational Entity]. [{$pagename}] answers questions about Digital [Identity State]. [{$pagename}] addresses the need to ensure appropriate access to [resources] across increasingly heterogeneous technology environments and to meet increasingly rigorous [compliance] requirements. The terms "[Identity Management]" ([IdM]) and "[{$pagename}]" are used in our discussions interchangeably in the area of Identity access management. [Identity Management Architecture] includes the products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications. [{$pagename}] covers issues such as how users gain an [Digital Identity], the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.). !! Key survey findings Ponemon Institute, a privacy and information management research firm, conducted this inaugural study on identity compliance. The goal of the study was to better understand how business and government organizations are ensuring correct identity and access management (IAM) rights within their enterprises. * Although a majority of organizations are using [{$pagename}] ([IAM]) solutions today, two-thirds of them remain unable to effectively focus IAM [policies|Policy] and prioritize controls on the greatest areas of business [risk]. * For more than 70% of the respondents, identity compliance is ranked as important. The top identity compliance concerns include both tracking access of temporary and privileged users and ensuring privileges match the user’s job function. * Most [organizations|Organizational Entity] believe that the mission of identity [compliance] falls on the shoulders of four key groups ** business/application owners ** IT operations ** audit/compliance groups ** IT security Unfortunately, more than 65% of respondents feel that there is little to no collaboration among these groups further hindering chances of success. !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Identity_management|Wikipedia:Identity_management|target='_blank'] - based on information obtained 2016-12-01-