1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Security Requirements Are Driving Identity Management

Discussion in 'Network World' started by RSS, Jan 28, 2016.

  1. RSS

    RSS New Member Member

    Anyone familiar with identity management knows that it can be extremely messy – lots of tactical tools, access policies, multiple data repositories, manual processes, etc. Furthermore, user authentication continues to be anchored by user names and passwords making nearly every organizations vulnerable to credentials harvesting, identity theft, and cyber-attacks.

    These persistent IAM problems remain, even though identity management is becoming a bigger component of enterprise security. This is true because as organizations embrace cloud and mobile computing, they lose some control over their IT infrastructure. As one CISO mentioned to me, “when we lose control in some areas we need to get better control over others as compensating controls.”

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page