Bharti Airtel taps IBM identity intelligence software to strengthen information management

By Telecom Lead Team: IT
major IBM announced that Bharti Airtel, a telecommunications provider in India,
is utilizing its new identity intelligence software to strengthen information
management.


IBM’s analytics software called Security Role and Policy
Modeler analyzes employee data and recommends a finite set of roles to better
secure an organization and manage compliance. The analytics can flag abnormal
behavior, inconsistencies in role access and expired user access.


The new IBM offering will provide greater insight to our
role modeling and lifecycle management that is so critical to allowing our employees,
partners and third parties to securely access data they are authorized to.
Using the intelligence and automation of the Role and Policy Modeler, we can
manage our identity and roles much more efficiently and effectively,” said
Felix Mohan, global chief information security officer, Bharti Airtel.


IBM’s new identity intelligence breakthrough designed in
IBM labs will provide corporations with a far more sophisticated approach to
managing the information employees can access.



With the rise of cloud and mobile access, it’s no surprise that identity
management has become such a hot button to clients. If an organization doesn’t
know who has access to their data, how can meet compliance regulations, let
alone be secure? Today’s news shows how IBM is applying its advanced
intelligence to solve the most complex security issues,” said Marc van
Zadelhoff, vice president strategy and product management, IBM Security
Systems.


Security Role and Policy Modeler is now available as part
of IBM’s software for policy-based identity and access management governance
offering. The new software allows companies to efficiently collect, clean up,
correlate, certify, and report on identity and access configurations.


Specific new functions include:



* Scoring metrics and analytics that give business users the ability to produce
a more effective role and access structure. Users can be identified by specific
role they play in an organization. For example, a marketing team manager can
only allow employees to access marketshare data but not human resources
information.



* Clearer view into the role structure such as organizational hierarchy charts,
and access exceptions due to business needs that can be managed throughout the
users’ lifecycle. For example, if an employee moves from one department or
function to another, that employee can be assigned or restricted from accessing
particular applications or business assets based on their role structure within
the organization.



* Single web-based interface to create, apply and validate roles that have
multiple members. For example, a physician” can be the group role and
cardiologist” or radiologist” is the member role. Each role can be assigned
different access and can be mined to identify outlying behavior and validated
for violations.


[email protected]