Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Accenture Security Introduces Identity Management Capability Powered by AI to Transform the Way User Access Privileges Are Managed, Monitored and Controlled

Next-Generation Intelligent Solution Improves Accuracy and Speed of near Real-Time Digital Identity Access Privileges

With the growing volume of access rights to administer across thousands of employees and applications, many large organizations are struggling to manage and secure the fluid nature of user privileges. In response, Accenture has introduced a next-generation digital identity and access management (IAM) capability to help organizations reduce the risk and costs associated with the over-provisioning of accounts tied to a user’s identity.

NEWS: Accenture Security introduces new #digitalidentity management capability #IAM

Aggregating data from multiple systems and sources, the patent-pending IAM capability simplifies the complexity of managing and monitoring who has access to what. It improves and increases the accuracy and speed of near real-time updates to user privileges using artificial intelligence and machine learning to contextualize identity decisions and continuously keep up with ever-shifting changes to user access rights. This will help organizations to proactively identify higher-risk areas that may require more governance, reducing the need for error-prone manual provisioning methods of today’s IAM systems.

Read More: How to Ensure AI Doesn’t Make Your Customers Hate You

“When it comes to managing user privileges, the provisioning of access should be based on precise knowledge of who a person is and why they need it,” said Kelly Bissell, a senior managing director at Accenture who leads its global Security practice. “The challenge is that existing approaches to access management are built on guesswork instead of a complete level of information. With our IAM capability we’ve created a proactive approach to identity management that help reduce human error and cost and helps improve risk awareness and make outliers easier to identify.”

Related Posts
1 of 40,446

To help determine efficient and secure access, the IAM capability generates a confidence score for each user, continually monitoring access data to ensure that the scores are frequently updated. Low confidence scores indicate potentially risky access, and high confidence scores can be considered for automated approvals, freeing those who conduct manual approvals to focus on unusual patterns and risky outliers. It can also predict and recommend access needs for new joiners in a company, saving time, money and effort in the onboarding process.

Read More: Brands that Realize the Potential of Augmented Reality

In an environment where the average cost to companies from “malicious insider”-related cyberattacks jumped 15 percent in 2018 to US$1.6 million per organization, it has never been more critical to ensure that the right people have access to the right resources at the right time.

“Security breaches that hit the headlines are often due to errors and oversights with access rights,” said Rex Thexton, a managing director at Accenture who leads its Digital Identity practice. “Our new IAM capability gives full visibility and smarter management of access rights throughout the entire enterprise landscape. With just one click it streamlines, simplifies and accelerates permission decisions through an easy-to-use interface. Until now, nothing this advanced has been available in the market that can provide the next level of transparency needed to deliver better management of permission requests.”

“We see enormous potential to transform our current identity access model from a static interface to a dynamic, intelligent and scalable resource that can increase efficiency and reduce costs,” said Kurt Lieber, chief information security officer of Aetna. “This type of transformation gives us the ability to make better decisions faster, so the right people get access to the right business resources at the right time.”

Read More: Cyxtera Reveals Research Finding IoT Devices Under Constant Attack

1 Comment
  1. Copper anode scrap acquisition Copper extrusion recycling Metal scraps recycling solutions
    Copper cable scrap granulation, Scrap metal export documentation, Copper scrap quality control

Leave A Reply

Your email address will not be published.