VIDEO: Identity Management Situational Awareness with ESG’s Jon Oltsik
IAM is one of the most important and comprehensive enterprise security technologies available, however, with the diverse group of individuals involved in this process and the rapid changes in today’s IT environment, the IAM process is becoming increasingly difficult.
In this video, ESG’s Senior Principal Analyst, Jon Oltsik, discusses the requirements for a successful identity and access management strategy.
Join Joe as he describes the five constituencies of a successful IAM strategy, and breaks down why 40% of IT and cyber security professionals believe that IAM is more difficult today than it was two years ago.
This article was written by Jeff Edwards on January 28, 2016
Tags
Jeff Edwards
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
- 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017