Access your Pro+ Content below.
Start redrawing your identity and access management roadmap
This article is part of the Information Security issue of April 2017 Insider Edition
Retro can be fun, but when it comes to roadmaps, you want the latest in GPS technology. And if new tech is best for secure trip planning, it's doubly useful for keeping your enterprise systems and data secure. A key tool for reaching a secure destination is an up-to-date identity and access management roadmap that helps you set the best policy and obtain the best tools for your enterprise. An effective IAM roadmap will present a clear view of the likely threats to your enterprise and will count on forethought from you and your infosec team. That requires that you understand the major changes sweeping the world of IT, from shadow IT to mobility to the internet of things and beyond. It also requires knowledge of the IAM market, especially the spread of cloud-based services, from "establishment" players like Microsoft and Oracle to the new generation of companies like Ping Identity and Okta. Consider this April 2017 Insider Edition quarterly supplement to Information Security magazine as your tool to redrawing your identity and ...
Features in this issue
More likely than not, your company's identity and access management strategy needs an update. Learn how to decide if that's the case and, if so, what you should do now.
Not sure who's really behind that username and password? Google, Facebook and others may finally give multifactor authentication technology the 'push' it needs.
Columns in this issue
Securing enterprise systems and information requires an IAM roadmap that helps you identify effective policy, technology and tools.