October 27, 2017 By Lane Billings 2 min read

Have you ever logged into your cellphone, Wi-Fi and banking accounts all at once? If not, shouldn’t you be able to? A global trend toward digital consolidation is making merged digital experiences — wherein a user can access multiple unique services via one set of credentials — more and more common for the average consumer. If you are a diversified brand that offers multiple unique services, providing your consumers with single sign-on (SSO) is more than just a nice-to-have — it’s now a business imperative.

Access management, the process of granting authorized users the right to use a service, is at the heart of single sign-on (SSO). If you’re working in an industry that is experiencing lots of merger and acquisition activity, you must regularly recalibrate your technology and approach to keep pace with the size of your user community. Disparate services, accessed by a variety of different device types, must be connected and standardized via one platform, and that platform must be ready to scale and adapt as quickly as possible.

A Lesson From Luxembourg

IBM Security’s identity and access management (IAM) solutions support clients around the world with the strategies and technologies they need to remain secure while they undergo digital transformation. Our team of IAM experts works with companies large and small to help them maintain a high level of security even as their businesses grow.

One such example is POST Luxembourg, a key player in Luxembourg’s postal, telecommunications and finance sectors. Andre Leruitte, security architect at POST, recently visited our IAM marketing team to discuss how the company used IBM Security Access Manager (ISAM) to future-proof its access management program against business change. In the video, Leruitte explains how his team used ISAM to get ahead of the winds of business change, establish SSO across multiple services and accelerate application development processes with a centralized platform.

As a diversified, government-owned corporation, POST Luxembourg provides multiple disparate services to its users — everything from stamps to banking and cell service. As Leruitte explained, establishing a unified digital presence is paramount to remaining competitive. “Everything in the sectors we compete in is converging into one user account, one bill, but multiple services behind it.”

Still, federating identities across disparate systems to establish consistent SSO is often easier said than done. “It was really complex, with older systems where everything was separated, to be able to supply the customer with a unique user account where they could manage all their services,” Leruitte said.

A Future-Proof Approach to Access Management

Think about the state of your digital business today. What IAM solutions do you have in place and what channels do they support? If your business or agency absorbed another one, would your technology be ready to scale to provide the same level of service to your internal and external users?

When developing your access management strategy, work with the team in charge of your digital business to ensure that your platform can grow with your organization. POST Luxembourg is one of hundreds of clients successfully using IBM ISAM to provide access and authentication to their internal and external users. That’s part of why ISAM was recently named a leader in the “2017 Gartner Magic Quadrant for Access Management,” a holistic overview of the vendors competing in the market.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today