This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print this page

What’s the Password

Taking control of identity management


DOWNLOAD  

Control of information has never been more critical to an organization, its employees, vendors, and business partners. Yet never has it been more difficult. Unauthorized system access leading to compromised data and information causes anxiety on the part of executive officers and security consultants, of almost every organization across the globe.



In “What’s the Password,” Deloitte details the concerns that businesses have in organizing and managing identities across business functions. The massively interconnected world in which business is conducted today creates the burden of managing complex information systems that are accessed by thousands, if not hundreds of thousands, of people daily. Passwords represent a notorious weakness within systems, applications, and sites. Aggravating the problem is the fact that those to whom an organization extends access are legion—vendors, customers, administrators, and others.

Deloitte’s groundbreaking “Access Maturity Model” approach to enterprise access controls moves access control management from information systems to business units, particularly human resources. Because these controls can be more readily aligned with enterprise-wide strategies and objectives, there is reduced risk, streamlined, automated processes, and easier, more effective compliance and audit reporting. And, companies are positioned to support cloud computing initiatives, the intersection of physical and logical security, and more fully integrate the role management in ERP systems.

Last updated

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options

Stay connected