The Future of Identity and Access Management: Top Four Priorities

Share  
1  |  2  |  3  |  4  |  5  |  6
Previous Next

Click through for four priorities critical to the future of IAM, as identified by Gartner.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

The nexus of forces — social, mobile, cloud and information — is bringing new challenges and opportunities for identity and access management (IAM). Chief information and security officers (CISOs) and IAM leaders must keep sight of the demands of day-to-day operations, governance, risk management and compliance, while extending their vision to include the nexus and the delivery of meaningful, business-focused results.


The nexus of forces is already having a tactical impact on IAM. Businesses must manage identity in an increasingly hybrid world in which legacy on-premises IAM infrastructures are extended or replaced to support software as a service and mobile endpoints. Identities established on social media platforms are also being used for enterprise system access. Organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.

This slideshow features key actions, identified by Gartner, for CISOs and IAM managers to prioritize in 2013, in light of trends in the IAM market.

 

More Slideshows

Security28-290x195 Nine Questions to Ask When Selecting a Security Vendor

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?  ...  More >>

LogRhythmHeartbleed0x Heartbleed: Eight Tips and Strategies for Keeping Safe

One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe. ...  More >>

Security27-290x195 Seven Key Components to Start Your Incident Response Plan

Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.