Here’s something you’ve probably heard before: the firewall-defined boundary that used to confine an organization’s IT assets and users is falling apart amidst an explosion in mobility, data, and cloud applications—identity has emerged as the new perimeter for enterprise information security.
Indeed, Identity Management is one of the hottest, most important areas in information security today, and it’s also one of the fastest going business segments in IT.
But as technology improves, the volume of terminology around it increases—there’s a seemingly endless torrent of new terminology surrounding Identity Management, and the acronyms just keep piling up—IAM, IDM, PIM, PAM, SIEM, RBAC, SSO,—the list goes on and on. Worst of all, if can be difficult to find an explanation that doesn’t reference another half dozen ciphered terms.
Here at Solutions Review, we do our best to provide IT professionals with the top Identity Management news, best practices, and buyer’s guides, and in keeping with that mission, we now bring you a quick and easy way to decipher the growing collection of Identity Management terminology: The Solutions Review Identity Management Glossary.
From access to termination, Solutions Review’s A to Z Identity Management Glossary has definitions for over 50 of the most popular Identity Management terms and acronyms.
Defined terms include:
Central Authentication Service (CAS)
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Customer Identity and Access Management (CIAM)
Federated Identity Management
Identity Access Governance
Identity and Access Management (IAM)
Identity Governance and Administration (IGA)
Identity Management (IdM)
Level of Assurance (LoA)
One Time Password (OTP)
Role-Based Access Control (RBAC)
System for Cross-Domain Identity Management (SCIM)
Security Entitlement Audit
Self-Service Password Reset
Single Sign-On (SSO)
System of Record (SoR)
Solutions Review’s Identity Management Glossary is a living document and will be updated with new terms and updated definitions periodically. If you have any questions or suggestions please feel free to contact us.
Interested in learning more about identity management? Check out these additional resources:
- 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017