The Future of Identity and Access Management: Top Four Priorities

Share  
1  |  2  |  3  |  4  |  5  |  6
Previous Next

Click through for four priorities critical to the future of IAM, as identified by Gartner.

The nexus of forces — social, mobile, cloud and information — is bringing new challenges and opportunities for identity and access management (IAM). Chief information and security officers (CISOs) and IAM leaders must keep sight of the demands of day-to-day operations, governance, risk management and compliance, while extending their vision to include the nexus and the delivery of meaningful, business-focused results.

The nexus of forces is already having a tactical impact on IAM. Businesses must manage identity in an increasingly hybrid world in which legacy on-premises IAM infrastructures are extended or replaced to support software as a service and mobile endpoints. Identities established on social media platforms are also being used for enterprise system access. Organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.

This slideshow features key actions, identified by Gartner, for CISOs and IAM managers to prioritize in 2013, in light of trends in the IAM market.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Risk6-290x195 Top Barriers to Effective Vulnerability Risk Management

When it comes to the effectiveness of traditional vulnerability risk management programs, the challenges are often rooted in the process itself. ...  More >>

HexisCyberSoluRetailTargets0x Eight Reasons Why Cyber Attacks Hit Retailers

With limited IT resources and massive amounts of customer data to protect across multiple endpoints, effectively monitoring and defending the network from vulnerabilities is no easy task. ...  More >>

security14-190x128.jpg Financial Sector Sees Cyber Incident Increase in February

In February 2015, Financials was the lone industry sector with cybercrime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date