IAM is one of the most important and comprehensive enterprise security technologies available, however, with the diverse group of individuals involved in this process and the rapid changes in today’s IT environment, the IAM process is becoming increasingly difficult.
In this video, ESG’s Senior Principal Analyst, Jon Oltsik, discusses the requirements for a successful identity and access management strategy.
Join Joe as he describes the five constituencies of a successful IAM strategy, and breaks down why 40% of IT and cyber security professionals believe that IAM is more difficult today than it was two years ago.
Latest posts by Jeff Edwards (see all)
- 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017