As a contract producer for over 1,000 prospects, together with among the world’s largest expertise corporations, Flex Ltd just a few years in the past wanted a safer solution to handle provider entry to its methods.
The corporate’s 1000’s of provide chain companions, scattered across the globe, ranged in measurement from tiny mom-and-pop outfits with little greater than a Gmail deal with to massive international corporations. Many used a number of accounts and methods for accessing apps at Flex and the corporate had no centralized solution to handle passwords or for provisioning and de-provisioning provider entry to its community. Flex’s capacity to detect suspicious and irregular exercise was additionally restricted due to the extremely distributed nature of its identification and entry surroundings for suppliers.
An IAM overhaul
With the teachings of the large breach at Goal—brought on by hackers utilizing community credentials stolen from a associate—nonetheless comparatively contemporary, leaders at Flex determined to overtake the corporate’s identification and entry administration (IAM) infrastructure for suppliers.
Flex executives needed to make it possible for essential mental property (IP) and knowledge belonging to prospects for whom it was designing, constructing and distributing merchandise remained protected on its methods. The corporate additionally needed to make sure a greater expertise for suppliers accessing its cloud and on-premises apps. “We wanted to set issues proper for extra visibility and in addition for extra user-friendliness for suppliers to interact with us,” says Fritz Wetschnig, CISO and vp enterprise data expertise at Flex.