The Future of Identity and Access Management: Top Four Priorities

Share  
1 | 2 | 3 | 4 | 5 | 6
Previous Next

Click through for four priorities critical to the future of IAM, as identified by Gartner.

The nexus of forces — social, mobile, cloud and information — is bringing new challenges and opportunities for identity and access management (IAM). Chief information and security officers (CISOs) and IAM leaders must keep sight of the demands of day-to-day operations, governance, risk management and compliance, while extending their vision to include the nexus and the delivery of meaningful, business-focused results.

The nexus of forces is already having a tactical impact on IAM. Businesses must manage identity in an increasingly hybrid world in which legacy on-premises IAM infrastructures are extended or replaced to support software as a service and mobile endpoints. Identities established on social media platforms are also being used for enterprise system access. Organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.

This slideshow features key actions, identified by Gartner, for CISOs and IAM managers to prioritize in 2013, in light of trends in the IAM market.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security60-190x128.jpg Five Steps to Integrate SAP into Your Enterprise Defense Framework

In addition to being an enterprise resource planning (ERP) tool, SAP is also a primary storage vault for a vast amount of sensitive and business-critical data. ...  More >>

Risk8-290x195 Survey Reveals Message Supervision Plays a Growing Role in Risk Prevention

Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity. ...  More >>

Gov2-290x195.jpg Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date