CIO's Future of Work Summit (June 14-15)
Identity And Access Management: The Pursuit Of Invisible Value
CIO, April 27th, 2022
May 8, 2022,
Volume 290, Issue 1

The speed versus risk balance is always in question while considering identify and access management in enterprise transformation scenarios

Ashraf Motiwala, Chad Wolcott, and Dusty Anderson writes in CIO, "Identity and Access Management(IAM) is the cornerstone of security. Proper IAM enables legitimate internal and external users to access the right data at the right time from the right devices. While IAM may seem like a check box in the journey to technology transformation, its role is much larger.

CIOs identify and focus on current strengths and weaknesses to arrive at a best-of-breed IAM solution that is structurally sound and integrates well in the organizational technology ecosystem. They implement IAM programs that enable efficiency and trim duplicative or overlapping technologies so that organizations are not over-licensed for capabilities that will not be utilized..."

Read More ...


Other articles in the IT News - Security section of Volume 290, Issue 1:

See all archived articles in the IT News - Security section.