The Future of Identity and Access Management: Top Four Priorities

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Previous Next

Click through for four priorities critical to the future of IAM, as identified by Gartner.

The nexus of forces — social, mobile, cloud and information — is bringing new challenges and opportunities for identity and access management (IAM). Chief information and security officers (CISOs) and IAM leaders must keep sight of the demands of day-to-day operations, governance, risk management and compliance, while extending their vision to include the nexus and the delivery of meaningful, business-focused results.

The nexus of forces is already having a tactical impact on IAM. Businesses must manage identity in an increasingly hybrid world in which legacy on-premises IAM infrastructures are extended or replaced to support software as a service and mobile endpoints. Identities established on social media platforms are also being used for enterprise system access. Organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.

This slideshow features key actions, identified by Gartner, for CISOs and IAM managers to prioritize in 2013, in light of trends in the IAM market.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightProactiveRiskMgmt0x 5 Steps for Proactive Cyber Risk Management

Companies need to be more proactive and take steps to reduce their cybersecurity risks, as well as establish procedures should a breach occur. ...  More >>

CloudmarkPhishingScams0x Scammers Go Phishing: Business Email Compromise on the Rise

Tips for businesses and individuals on how to combat phishing attacks and prevent identity and tax fraud as financial losses. ...  More >>

SupplyChain1-290x195.jpg Security Risks in the Supply Chain

While the use of IoT technology enables retailers to better track their products from production through delivery in the supply chain, it also introduces a variety of security and data risks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.