Meeting the Challenges of a Long-Term Hybrid IT Model

For digital transformation programs that require cloud adoption while maintaining legacy IT systems and environments in line with the hybrid IT model, the conventional approach to IT management is inadequate.

Hybrid IT solutions will continue to be used for some time as it is expensive and complex to migrate legacy infrastructure to the cloud. Regulating application access becomes more critical as enterprise IT adopts more cloud systems while retaining on-premises solutions. As a result, whole new identity management issues will emerge, driving a fundamental shift in the role of IT in business processes.

User password exhaustion

Users can initially access their applications more easily, thanks to the SaaS approach, but when other applications are added, the complexity increases rapidly. With separate login URLs and password requirements, each application has its own identity store. This scattering of credentials decreases user productivity and adds to user inconvenience as it takes time to store and modify constantly changing passwords and URLs across all their applications. The security dangers posed by customers who, due to this “password fatigue”, use obvious and inadequate passwords or repeatedly use the same passwords on different platforms are arguably greater. worrying. Worse still, they frequently save these credentials in dangerous text files on their laptops or in Post-it notes.

User directories separated by applications

To control access to on-premises network resources, most companies have invested heavily in corporate directories. Instead of building a separate directory and access management infrastructure just for these new SaaS applications, companies using cloud-based services should leverage their existing investment and extend it to the cloud. The Gartner study predicted in Is the cloud secure? that 90% of companies that do not regulate their use of the public cloud will inadvertently share sensitive information by 2025.

Automatic rental and deprovisioning process likely to fail

IT often gives new hires access to the company network, file servers, email addresses and printers when they start working there. Because many SaaS applications are controlled at the departmental level, access to these applications is often authorized by the administrator of each application rather than a single member of the IT department. As a result, the company is at risk as critical business applications and data may be in the hands of disgruntled former employees, and auditors are looking for loopholes in deprovisioning procedures.

Read also : Enterprise Hybrid Working Model Operational Risk Management

Access management during remote work

Mobility from any device with an Internet connection is one of the main advantages of cloud applications. However, more and more apps require more URLs and passwords, and the popularity of mobile devices adds another access point that needs to be supported and managed. With the current IAM-solutions, IT organizations need to enable access to multiple devices and platforms without sacrificing security.

Keep app integrations up to date

True centralization of single sign-on and user management requires developing integrations with various applications and monitoring maintenance requirements for new releases of each application. It would be impractical and inefficient for the vast majority of enterprise IT departments to maintain their assortment of “connectors” in this ever-changing terrain.

The downside for IT pros is that each new vendor may require a new onboarding strategy, especially in terms of authentication and user management.

Durable Administrative Templates for Durable Applications

More point SaaS solutions are being adopted by businesses every day as cloud applications become cheaper and easier to configure. Often, the respective functional area of ​​a company is responsible for managing these solutions. This can be an advantage for the IT department, as the application administration can be exploited by others who offer them more time. Meanwhile, this can be a drawback as no central location would be available to coordinate users and applications to provide reports and analytics.

Check out the new Enterprisetalk podcast. For more such updates, follow us on Google News Company news.