The Perimeter: An Identity Crisis

Understand IAM and its challenges

Published September 2017

Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue.

In any organization, a specific user may have multiple identities for various corporate resources and web applications. Add to that the many devices and locations users connect from, and it is evident that many organizations are dealing with a different sort of identity crisis.

Enter IAM. Put simply, identity and access management is about verifying a user’s identity and granting/denying access. This report takes a look at the challenges of managing identity and access and goes on to look at best practices aimed at helping organizations reposition their IAM strategy given the current realities of the cloud and the new security perimeter.

You will have to register, or log in, in order to download this paper.

Biting the hand that feeds IT © 1998–2018