Get Instant Access
to This Blueprint

Security icon

Develop a User Management Strategy

Users are the number one security risk. Since you can't operate without them, you'd best be able to control them.

  • Users are not hired to be security or compliance experts, but their daily actions can have significant ramifications on enterprise security and compliance efforts. Enterprises simply can't afford these headaches.
  • User Management technologies include a wide range of solutions, with new niches opening up and new players entering the market all the time. Keeping current with all these offerings can overwhelm even the most seasoned IT professionals.
  • Ensuring solid security and compliance means building a comprehensive and well-thought out User Management strategy, and doing it without breaking the bank.

Our Advice

Critical Insight

  • Identity & Access Management is the pinnacle of User Management technologies as it rolls up the functionality of most other tools. If your enterprise is considering implementing at least two dedicated User Management tools (Single Sign-On, Automated Provisioning, Activity Monitoring and Reporting) you may realize cost savings with a dedicated IAM solution instead.
  • Though not strictly a solution to manage users per se, Multi-Factor Authentication integrates well with most User Management solutions, particularly those that are focused on user access (Password Management and Single Sign-On), ensuring a higher level of assurance that authenticating users are who they say they are.
  • Tools are all well and good, but at the end of the day, they support the policies and procedures that you put in place; you must take the time to establish these process aspects of your User Management strategy, or the tools you put in place will have nothing to enforce.

Impact and Result

  • User Management technologies often have overlapping capabilities, and don’t come cheap, in some cases costing into the hundreds of dollars per user. Understanding which capabilities are required and those which are not, can allow enterprises to achieve appropriate protection, without investing in duplicate or unnecessary capabilities.

Develop a User Management Strategy Research & Tools

1. Get an overview of User Management

Understand the value of an investment in this key area of IT security.

2. Determine the difference between various UM technologies

Establish a UM investment strategy.

3. Identify vendors and solicit information

Conduct an apples-to-apples comparison of UM tools.

Develop a User Management Strategy preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Authors

James Quin

Derek Silva

Contributors

  • Corporation of the City of London, Ontario
  • Empowered Networks
  • Brockville General Hospital
  • Ecology & Environment, Inc.
  • Acosta, Inc.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019