The Future of Identity and Access Management: Top Four Priorities

Share  
1  |  2  |  3  |  4  |  5  |  6
Previous Next

Click through for four priorities critical to the future of IAM, as identified by Gartner.

The nexus of forces — social, mobile, cloud and information — is bringing new challenges and opportunities for identity and access management (IAM). Chief information and security officers (CISOs) and IAM leaders must keep sight of the demands of day-to-day operations, governance, risk management and compliance, while extending their vision to include the nexus and the delivery of meaningful, business-focused results.

The nexus of forces is already having a tactical impact on IAM. Businesses must manage identity in an increasingly hybrid world in which legacy on-premises IAM infrastructures are extended or replaced to support software as a service and mobile endpoints. Identities established on social media platforms are also being used for enterprise system access. Organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.

This slideshow features key actions, identified by Gartner, for CISOs and IAM managers to prioritize in 2013, in light of trends in the IAM market.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security48-290x195 Five Myths Holding Your Security Program Back

In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. ...  More >>

Misc44-290x195 Most Dangerous Cyber Celebrities of 2014

McAfee recently released its eighth annual study revealing the most dangerous celebrities to search for online. The study found a mix of comedians and musicians among the most dangerous. ...  More >>

Security47-190x128 From a Hacker's Perspective: How to Breach a Point-of-Sale System

Electronic payments have started to outnumber cash transactions, and hackers have taken notice -- with an increased number of point-of-sale (POS) system breaches making the headlines. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.