Identity management in an IT world that mixes the cloud, legacy mainframes, and everything in between has become very challenging. 21st century businesses have knowledge-workers spread across diverse geographic locations using a broad array of devices and methods of connectivity. There was a time when the only security necessary was a keypad on the computer room door. If you created your JCL (Job Control Language) deck correctly you had the ability to access any and all resources available to the mainframe. Program results were spit out onto green-bar, which could then be analyzed and acted upon by business users.

Modern Times

Fast forward to today. That same mainframe may be spitting out the results of those original batch files, but now the output is bits and those bits are dumped into a database where that data can be analyzed, sliced, diced, reported on, and acted on by a plethora of applications. Those applications were probably developed at different times using different technologies. If you are like most organizations you have evolved through various computing methods and different ways of authenticating and authorizing users.

Want to continue reading?
Become a Free
PropertyCasualty360 Digital Reader.


  • All news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including and

Already have an account?

Dig Deeper



Join PropertyCasualty360

Don’t miss crucial news and insights you need to make informed decisions for your P&C insurance business. Join now!

  • Unlimited access to - your roadmap to thriving in a disrupted environment
  • Access to other award-winning ALM websites including, and
  • Exclusive discounts on PropertyCasualty360, National Underwriter, Claims and ALM events

Already have an account? Sign In Now
Join PropertyCasualty360

Copyright © 2022 ALM Global, LLC. All Rights Reserved.