IAM Archives - Ilantus Technologies

Success Begins with User Adoption

By | IAM, Uncategorized | No Comments

More than half of all IT project implementations fail to get adopted in organizations worldwide. These
failures are seldom because of the technology used or the product implemented. Frequently, it is a
problem with an insufficient understanding of the business’ goal and users’ needs. A successful system
that is not adopted is as good as a failed system.

At ILANTUS, user adoption is a vital discussion point from the phase of requirement gathering. With over
16 years of experience in IDAM solution implementations, ILANTUS has assisted multiple businesses in
putting together a comprehensive adoption plan and there by has helped steer them towards a
successful implementation with contended users. Various aspects impact user adoption and these
should be carefully managed.

Know the User and the Need
Understanding the end user landscape and fulfilling their needs are key aspects to the success of any
solution implementation. The reason why an organization is looking for a single sign on or password
management solution must be clearly understood. The solution being implemented should constitute all
use cases that the end users are looking forward to. Adoption starts when the user has a convincing
reason to interact with the system.

Anticipate Resistance
Human beings are naturally averse to change, and a technology implementation is no different. This is
the reason why end user training is of paramount importance. The user should be educated about the
new solution and how he will benefit by it. The training sessions should help build affinity and
awareness of the new system and in return a desire to use it. These training sessions should be relevant
and tailored to the specific audience. ILANTUS products have many niche features that help users get
accustomed to the system faster without hassle.

Market to the End User
Most organizations need assistance and advice while getting started on the new system. Social mediums
and venues like lunch rooms, clubs, intranet sites and enterprise social solutions are all powerful tools to
reach the user. Developing a marketing plan and a promotional strategy have always yielded good
results. Utilizing a combination of mediums triggers user eagerness and demonstrate the importance of
the initiative.

Identify Ambassadors and Reward Users
Each team or unit that gets introduced in the system should have an ambassador. The ambassadors
should have enough knowledge on the system and should be able to guide their colleagues. Rewarding a
user who starts using the system actively will encourage every other user in the team.
Implementing an effective adoption program is not easy and needs lot of time and effort. With the
poorsuccess rates seen worldwide, it is obvious that organizations need to invest wisely in adoption
programs. Adoption activities should start from inception, continue through the implementation phase,
and follow the user always.

Request a Demo

By Karamchand Ramachandran
Technical Manager
Ilantus Technologies

How Ilantus embedded AI helps improve User Experience

By | Uncategorized | No Comments

Companies are making a move towards global access and faster technologies to serve their customers faster, better and more efficiently than the competition. Service to customers is about speed and accuracy and none can be compromised.

Introducing Ilantus IDaaS Next with AI driven Single Sign On portal inspired by a “Smartphone First” approach; as part of our constant endeavor to improve upon our user experience, Ilantus has done one better with the introduction of artificial intelligence in our portal and delivering some industry leading capabilities.

Keeping in mind every users experience is unique in its own way; yet it all has to meet the companies objective of fast and accurate customer service, our SSO portal offers its users the convenience and personalization they deserve and still drives home the organization goal.

Typically, users are tuned to working more on certain apps and less on some. With Ilantus AI, our portal technology can understand this user behavior and move up in the application icons launchpad which are most commonly used and where they are easily accessible instantly when you log in to Ilantus SSO platform saving valuable time for the user.

Our new platform enables the functionality of application search at all levels making far more convenient for any user to reach its target application. With just a few character types, the Ilantus SSO search box is able to pull up and display the application name for the user click and access.

With most of us having access to smartphones, the mobile way of working is the new normal for doing business. Ilantus SSO portal with its “Smartphone First” design philosophy is now able to deliver to its users a seamless “consistent” experience across all access platform from Laptops, Desktop, tablets and Mobiles. Everything from aligning applications icons as per our usage to changing background wallpaper to creating folders, the new normal is now the smartphone and Ilantus is committed in delivering this to our customers.

We at Ilantus are committed to deliver to our customers the User Experience which will completely revolutionize this industry and set new benchmarks for our peers and competition.

Read Whitepaper

What is Identity as a Service (IDaaS)?

By | IDaaS | No Comments


Experience the Difference


Identity as a Service (IDaaS) delivers identity management tools on demand via the internet in a simple and efficient way. However, are companies truly delivering tools specifically designed with the benefits of a cloud deployment or are vendors jumping on the cloud bandwagon and delivering “old wine in a new bottle?” One giant IT software provider is repackaging their decade-old solution to replicate the look and feel of the cloud service. Another company is delivering a cookie cutter approach: deliver 50% of the easy stuff while ignoring the more complex aspects of the software that would require a larger effort to deliver with smaller return on their investment. After five long years of development, IDaaS still touches only the tip of the iceberg without fulfilling the real needs.

For instance, Single Sign-On can only reach web/cloud applications; User Life Cycle management techniques cannot map more than 80% of processes and all the non-web complex applications; Governance that is truly yet to begin. To add to all this, the promise of delivering in a manner for users has not been fulfilled at all not to mention the ever increasing price points. This is not true IDaaS. ILANTUS’s latest development, “IDaaS 4U,” promises to offer true IDaaS that will fulfill the “real needs” rather than the hyped ones created by vendors.


[styled_button title=”Request a Demo” href=”https://www.ilantus.com/single-sign-on/request-a-demo/” link_target=”_blank” title_align=”text-center” display=”inline” button_height=”” text_size=”25″ letter_spacing=”” font_weight=”300″ text_color=”text-white” style=”style-2″ bg_color=”bg-second” icon=”” icon_size=”30″ icon_style=”” icon_color=”icon-color-white” border_width=”3″ border_style=”solid” border_radius=”5″ border_color=”border-color-second”]

   What is IDaaS Next

IDaaS> is an integrated solution that helps you manage, like never before, Identities within your organization; easily, economically and comprehensively.

Easy: For the first time users will be able to get experience that aligns with smart phones such as iPhone. The experience will be also identical across devices. This will make users continue with their existing experience rather that getting used to a new one.

Comprehensive: There will be few exclusion from more comprehensive but traditional IAM solutions. One can manage any application including Thick Client. One will be able to provision and deprovision application of any type, while mapping to many of their unique processes. For the first time, one will be able to have Access Governance solution and features that will help solve Audit & Compliance issue quickly.

Economical: The cost of the solution is less than 50% of solutions that are being sold today. This is true both for initial and recurring cost.

Many organizations look for a comprehensive Password Management system as resetting forgotten passwords is not all they want. ILANTUS has a comprehensive “Enterprise Password Management System” that has features only comparable to just a handful of products in the Industry.
“IDAAS 4U” is a journey, ILANTUS will deliver features and functions that will provide users with serious features while keeping the delivery quick and simple.

Tired of using multiple user ids & passwords?

By | IAM, Xpress Password | No Comments
  • User ID and password combination is still the most common way through which users gain access to an application. Average number of applications that a user has access to is increasing with the proliferating applications on-premise and on the cloud. Hence the number of passwords that a user has to remember is proportionally increasing.
  • Complex password policies and password history requirements lead to more number of incidents for ‘Forgotten Passwords’.
  • Due to stringent IT Security compliance & audit requirements, each user should have their own account to access each application.
  • More and more organizations are embracing adoption of BYOD. Hence organizations need to ensure users have access to applications through all these devices.
  • With globalization, remote workforce is proliferating. Ensuring access to applications for these remote workforces is a top priority for the organizations.
  • Adoption of Mac workstations is proliferating. Lot of organizations has a mix of Windows and Mac workstations.
  • These challenges lead user to use multiple user ids and passwords with more complex password policies. It reduces the user conveniences and of course, their productivity. On the other hand, increases the help-desk calls/tickets as the users often forgot their passwords or locked out their applications accounts.
    According to Gartner, one of the main global IAM Market Research organization:
  • Approximately 30% of total call load for multipurpose help desks are password-related. Volumes are higher for limited-function call centers.
  • Hard costs for help-desk-related calls range from $3 to $18 (For North America organizations) per call. The lower end of the range pertains to call centers that provide predominantly administrative support; the higher end of the range pertains to help desks that have more highly compensated technical staff that perform multiple support functions in addition to password-related calls.
  • Also, the use multiple user ids & password may lead to security threats, as users will find short-cut ways to remember these passwords such as sticking those passwords on their workstations/laptops, use “easily guessed” password or commonly used passwords such as “P@ss1234”, “Abcd1234” etc.
    By using a Single Sign On solution or a Password Management tools, these challenges can be easily addressed.

Password Resets: Save Money

By | IAM, Xpress Password | No Comments


Gartner and other analysts say that organizations spend between $5 to $15 in resetting one password.  While customers do realize resets are creating added costs, there is no comprehensive Password Management product that can truly meet the complex needs of an enterprise, ensure easy implementation and does not cost much.

ILANTUS has  one of the only solutions on the market that can save your organization  thousands of dollars a month through its comprehensive features, easy deployment while keeping the costs down.

Take a look at how to save money with ILANTUS XPRESS PASSWORD (PXP).

Identity Governance, IBM & SAP

By | IAM | No Comments

After years of being a legend, IBM is finally beginning to move with Access Governance features. Through the acquisition of Cross Ideas, IBM has brought its Identity Management Technology (ISIM) in line with some of the best.


But most still don’t know that IBM’s Access Governance has something special for SAP customers.

SoD (Segregation of Duties) was a Cross Ideas (company IBM acquired) strength for SAP customers.  Now IBM has refined this original Cross Ideas feature to serve the needs of SAP customers, providing IBM SAP customers with Access Governance and saving them thousands of dollars that they had to spend on complex technologies such as SAP GRC.

ILANTUS is the only partner of IBM that worked with Cross Ideas even before the acquisition.

As a trusted IBM partner and with an “SAP Innovation Lab,” ILANTUS understands SAP and  works with IBM technology that is easy to implement and support.

Do you have SAP & Okta SSO?

By | IAM | No Comments

Do you have SAP & Okta SSO?

If you have this combination, it is time to think again.

Okta provides no true SSO solution to the SAP world. SAP is a set of thick client that cannot be served by technologies such as Okta, One login, Centrify. ILANTUS has the only SSO solution (3 patents pending) to the SAP world that also works together with all other corporate applications.

So if you are paying a lot of money for Okta SSO and still not enabling your SAP environment on SSO, think again.


By | IAM | No Comments

Do you use IBM’s Web Access Management (WAM) technology (formally referred to as TAM, now referred to as ISAM)? TAM or ISAM provides a very generous set of Web Access Management features to manage access to your web applications.

However, ISAM fails to satisfy customer needs where on boarding new cloud/web applications to the Single Sign on (SSO) framework is needed. It also lacks intuitive user interface & ease in onboarding new applications.

ILANTUS SSO for ISAM is designed to snap fit on ISAM. Within two days, this snap fit can be deployed to provide you with all that ISAM lacks in the SSO domain. Snap Fit with ILANTUS SSO and fill the gap!

On Boarding New Apps

By | IAM | One Comment


IT infrastructure is considered as revenue generation investment and not merely a support infrastructure for business operations.
IT leadership team which recognizes this fact is always looking for cutting edge technologies to deliver on this mission and one such example is the Business team’s decision to onboard new IT applications for business requirements.

The time taken to deploy and operationalize the newly on-boarded application is crucial to the business decision and IT team has to be on its toes to meet this expectation / challenges.

Let us consider few challenges,

This new application has its own Authentication Store

This new application has its own Login URL

This new application has its own Authorization access model

ILANTUS’s solution is built to facilitate IT team to overcome this challenges, lets take each challenge in its context in below paragraphs,
1. With IDaaS solution you will be provided central user authentication store where in applications can be connected for authentication purposes, in case of applications which cannot be modified IDaaS connector factory can be leveraged to create / update user records in the third party application repository – this will reduce over heads for end user to remember application specific passwords.

2. With IDaaS solution you will be provided with a central landing page named as launchpad, which can be leveraged to add additional links as application icon on the launchpad – this will reduce over heads for end user to remember the new application URL and IT team can control the access to the link based on user’s job profile.

3. With IDaaS solution you can leverage IDaaS connector factory to add access within the application like adding entitlements , roles, groups or permissions to User profile, provided application supports third party API integration – this new application can be part of organizations generic access request workflow and this new application can be seamlessly introduced to End users.


User Productivity Vs IT Security

By | IAM | No Comments


Enterprises around the world are facing increasingly more security issues day by day. As a result organizations are considering to improve their security measures. One of the fundamental part of security is to provide ‘Availability’ which ensures reliability and timely access to data and resources to authorized individuals. Necessary protection mechanisms must be in place to protect against inside and outside threats that effect the availability of data and productivity of user.

It sounds to be easy to accomplish than in reality. Providing a balance between security and user productivity is a critical task for security professionals. The end users may not be aware of that following various security measures by the organization is necessary to prevent serious data breaches. The more compliant an organization is, the stronger is its IT security. But on the other hand it will automatically decrease the user productivity. Keeping a balance between security and user productivity is a challenge of all the times.

One way of achieving this is to provide least privileges to users in other words allow access to users only to what they need to do. It seems to be true in providing better solution but it may result to less productivity and frustrated employees. For example if employee is missing access to any resource, in this case according to organization’s security policy it may take days to provide the access which may lead to missing the deadlines.

In this case the frustrated employee may try to choose other alternatives to avoid the security because his/her goal is always to meet the deadlines. Another example is password management. If the security policy forces employees to change their passwords frequently they may end up keeping a sticky note on their PC to remember it, which leads to a security breach. If they forgot their passwords they will be ending up calling helpdesk to reset their passwords leading to decrease in user productivity.

The main idea here is to keep a good balance between security and user productivity. One should not affect other. As a security professional one should not blindly follow the industry best practices instead one should think twice before enforcing any security policy according to organization needs. Think about whom the policy will effect, what extent it will effect and how it will affect the end user.