Date of Publication
4-2023
Document Type
Master's Thesis
Degree Name
Master in Information Security
Subject Categories
Information Security
College
College of Computer Studies
Department/Unit
Computer Technology
Thesis Advisor
Marnel S. Peradilla
Defense Panel Chair
Gregory Cu
Defense Panel Member
Marnel S. Peradilla
Victorino Tolosa, II
Abstract/Summary
An Identity and Access Management (IAM) tool is essential for a Philippine Telecommunications company to ensure that only authorized users will have access to sensitive data at the right time for the right reasons and to comply with industry regulations. The cybersecurity landscape is continuously evolving, and we must always ask, does my current solution offer the agility, scalability, and security benefits my enterprise now needs?
The current tool, the Philippine Telco, has already gone through multiple Phases but has yet to mature the way the company wanted it to. The way it was deployed was full of compromises, therefore not delivering optimal data. There is an issue with storage, solution process maturity, and the need for internal and external support. That is why the company is opting to change the current tool.
The researcher made this paper in search of which tool would best fit the company. In terms of which will match the company's use cases and solve the issues they have with their current tool. The researcher considered a solution's scalability, integration with the current and future tools, user experience, and support coming from the vendors.
Two solutions were shortlisted, and one of them will be the recommendation of this paper to the top management of Telco once the budget has been approved. The paper will serve as a guide on the observations of the company's researcher, stakeholders, and IAM experts on why the tool was chosen as the replacement for the existing tool.
Abstract Format
html
Language
English
Format
Electronic
Physical Description
[91], 5 leaves
Keywords
System design—Data processing; Electronic data processing; Computer security; Data protection
Recommended Citation
Paulino, P. M. (2023). A case study on which IAM tool would be the best fit for a Philippine Telco. Retrieved from https://animorepository.dlsu.edu.ph/etdm_comtech/21
Upload Full Text
wf_yes
Embargo Period
4-2024