UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 10
October-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1810A65


Registration ID:
313384

Page Number

96-99

Share This Article


Jetir RMS

Title

A literature review on the application of AI to Identity Access Management

Abstract

The main focus of this research is to explore how artificial intelligence may be used in the context of identity and access management. The identity and access management system (IAM) is a prime requisite in the cybersecurity arsenal of many organizations. In addition to mitigating against data breaches, it also helps to manage the risks associated with working remotely and bringing your device – BYOD – into the workplace. Internal data synchronization, customer contact preference management, and fulfilling privacy compliance standards are just a few of the important tasks that IAM is continuously developing to handle in the modern world [1]. It is important to recognize the significance of a well-thought-out and well-developed IAM strategy. Determining who should have accessibility to what information is a tough decision for many companies, and this difficulty makes their information systems insecure. Forrester's study found that 83 percent of companies do not have a mature strategy to identity and access management (IAM). When compared to companies that have implemented their IAM strategy, these companies are twice as likely to have difficulties as a result of a security breach [1]. A clear positive correlation has been found between better IAM methods and decreased security risk, enhanced productivity, greater privileged activity control, and significantly reduced financial loss, according to the study.

Key Words

Identity and Access Management (IAM), artificial intelligence, automation, Internet of Things (IoT), Multi-Factor Authentication (MFA)

Cite This Article

"A literature review on the application of AI to Identity Access Management", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 10, page no.96-99, October-2018, Available :http://www.jetir.org/papers/JETIR1810A65.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A literature review on the application of AI to Identity Access Management", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 10, page no. pp96-99, October-2018, Available at : http://www.jetir.org/papers/JETIR1810A65.pdf

Publication Details

Published Paper ID: JETIR1810A65
Registration ID: 313384
Published In: Volume 5 | Issue 10 | Year October-2018
DOI (Digital Object Identifier):
Page No: 96-99
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000597

Print This Page

Current Call For Paper

Jetir RMS