Start With The End In Mind: Blog #3 – Increase Business User Productivity
(Source: SailPoint Technologies, Inc. Identity and Access Management Buyers Guide)
Whether you’re using identity management for internal users (employees and contractors) or external users (partners, agents, customers), you want to implement technologies that reduce the burden of accessing business services. Having the right identity and access management strategy can reduce internal costs and improve productivity, but it can also contribute to revenue growth and profitability, as more and more “users” are business partners, agents or customers. As IT becomes more “consumerized,” all types of users expect quick, convenient access. And that access is no longer limited to logging in from a corporate laptop or PC — today’s workers want access anytime, anywhere, via any device. Every minute that a user has to spend retrieving a lost password or having the help desk reset a password is an unproductive minute — and when you multiply the growing number of applications by the amount of time wasted, the high price of inconvenience becomes pretty clear.
“I can’t keep up with the incoming requests for managing user access across the organization. There’s got to be a better way!”
“Our business users have to remember so many passwords, they’re writing them on yellow sticky notes in plain view.”
Here are some questions you should consider as you plan your strategy to ensure your IAM solution delivers convenience and improves user adoption and productivity:
- Do you make it as simple as possible for new users to register and begin using your business services — even if they have no prior relationship with your organization?
- Can users request new access from a self-service tool without having to call the help desk?
- Do you provide simple password reset capabilities for users who have forgotten their username and passwords?
- Do you offer users a streamlined and personalized single sign-on experience for all the applications, regardless of where they are hosted or how employees access them — via a desktop, laptop or mobile device?
- Do you use risk-based authentication to ensure that low-risk transactions are as easy as possible, but high-risk transactions require more assurance?
Check back for blog #4, Manage Access Across On-premises and Cloud Applications
Visit SailPoint Technologies, Inc. here.
Learn more about PathMaker Group IAM MAP here.