Comprehensive Software Reviews to make better IT decisions

Sr hero 001 Sr hero 002 Sr hero 003 Sr hero 004

ADP – Integrating Automation of Human Capital Management With Identity Access Management

Streamlining functionality and workflows of human capital management (HCM) systems while ensuring a rigorous level of security can be challenging. ADP prides itself on staying in front of business need through innovative, mark-making HCM solutions.

Source: ADP at Software Reviews, Report Published January 2019

ADP’s goal is to help employees help themselves through digital automation and streamlining. In a press release this month, it explains its integration of identity and access management (IAM), Cloud Identity, with its productivity and collaboration services, G Suite.

Aside from security, the administration of identity services and access to information within an HCM system can be inefficient. Generally speaking, a time gap can also exist between hiring someone or moving into a new role and the back-end system changes necessary to get them up and running. This limits the speed at which they can begin to create value. Conversely, there can be significant risk to the organization if an employee is terminated but their security access is not removed quickly.

ADP states that by bringing both IAM and HCM workflows together, it is introducing expediency to provisioning services and lessening the burden of having too many employee accounts. This mitigates delays for employees in reaching full functionality, as well as data and security risks. Frank Villavicencio, CPO for Access & Identity Management at ADP comments:

"Thanks to this integration with Google Cloud Identity, our mutual customers can now realize measurable business benefits in productivity, end user satisfaction, compliance and security."

Our Take

The ease at which any system can be used is complicated by the progression of cloud-based processes and associated security threats. Before introducing new automation to HCM, organizations should first implement role-based access control (RBAC) to take inventory of permission/user-role assignments and carry out process and role engineering. This ensures you have foundational information in place before entertaining potential solutions put forward by vendors.


Source: Info-Tech Blueprint, “Simplify Identity and Access Management”


Want to Know More?

Cloud Identity Information – Google Blog Post

Simplify Identity and Access Management Blueprint – Info-Tech Research Group

Human Capital Management – Software Reviews