The Future of Identity and Access Management: Top Four Priorities

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Previous The Future of Identity and Access Management: Top Four Priorities-1 Next

Click through for four priorities critical to the future of IAM, as identified by Gartner.

The nexus of forces — social, mobile, cloud and information — is bringing new challenges and opportunities for identity and access management (IAM). Chief information and security officers (CISOs) and IAM leaders must keep sight of the demands of day-to-day operations, governance, risk management and compliance, while extending their vision to include the nexus and the delivery of meaningful, business-focused results.

The nexus of forces is already having a tactical impact on IAM. Businesses must manage identity in an increasingly hybrid world in which legacy on-premises IAM infrastructures are extended or replaced to support software as a service and mobile endpoints. Identities established on social media platforms are also being used for enterprise system access. Organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.

This slideshow features key actions, identified by Gartner, for CISOs and IAM managers to prioritize in 2013, in light of trends in the IAM market.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.