As a contract producer for over 1,000 clients, together with a number of the world’s largest expertise corporations, Flex Ltd a couple of years in the past wanted a safer option to handle provider entry to its programs.
The corporate’s hundreds of provide chain companions, scattered across the globe, ranged in measurement from tiny mom-and-pop outfits with little greater than a Gmail deal with to massive world corporations. Many used a number of accounts and programs for accessing apps at Flex and the corporate had no centralized option to handle passwords or for provisioning and de-provisioning provider entry to its community. Flex’s means to detect suspicious and irregular exercise was additionally restricted due to the extremely distributed nature of its identification and entry atmosphere for suppliers.
An IAM overhaul
With the teachings of the large breach at Goal—brought on by hackers utilizing community credentials stolen from a companion—nonetheless comparatively contemporary, leaders at Flex determined to overtake the corporate’s identification and entry administration (IAM) infrastructure for suppliers.
Flex executives wished to be sure that important mental property (IP) and information belonging to clients for whom it was designing, constructing and distributing merchandise remained protected on its programs. The corporate additionally wished to make sure a greater expertise for suppliers accessing its cloud and on-premises apps. “We wanted to set issues proper for extra visibility and in addition for extra user-friendliness for suppliers to interact with us,” says Fritz Wetschnig, CISO and vice chairman enterprise info expertise at Flex.