Managing users and their access to IT resources can be a time consuming task. Today’s modern IT networks leverage a variety of platforms, providers, and locations. Connecting them all together into one coherent system and hosting the required infrastructure can be challenging and cost-prohibitive. That’s why organizations today are increasingly opting for an outsourced user management system.
In order to understand the reasons behind this trend toward outsourcing user management, let’s begin by exploring user management’s history and the radical transformation that has taken place in the IT world.
Traditional User Management and the Changing IT Landscape
Most well-established IT organizations have leveraged Microsoft Active Directory® as an identity provider. AD came of age when the IT infrastructure was completely Windows based – both systems and applications – and users and their IT resources were all located on-prem.
Of course, we know that the world doesn’t look like that anymore.
Over the last ten years, IT environments have transformed. First, the Windows desktop operating system has lost about 20% of the market share worldwide. In the U.S., it’s even more with users leveraging a wider range of platforms including Mac and Linux systems. Next, web applications are more popular than ever. The web app industry is expected to be worth $46.8 billion in 2017, as solutions like Slack, Box, Github, and many others win over the enterprise. Also, cloud infrastructure providers such as AWS, Google Cloud Platform, and Azure are replacing the on-prem data center. In fact, AWS has seen a 42% growth in revenue over the past year. Finally, users are working from all over the world. According to this report from Gallup, 43% of employees work remotely. The IT networks of offices look a lot more like cafés than they do the fortified networks of old.
Challenges with Traditional User Management
The challenge with all of this change is that the traditional user management approach doesn’t work. Using AD as the core identity provider for a network only covers a small portion of the overall IT resources a user needs to access. IT admins (Read more...)
*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Vince Lujan. Read the original post at: https://jumpcloud.com/blog/outsourced-user-management/