The speed versus risk balance is always in question while considering identify and access management in enterprise transformation scenarios
Ashraf Motiwala, Chad Wolcott, and Dusty Anderson writes in
"Identity and Access Management(IAM) is the cornerstone of security. Proper IAM enables legitimate internal and external users to access the right data at the right time from the right devices. While IAM may seem like a check box in the journey to technology transformation, its role is much larger.
CIOs identify and focus on current strengths and weaknesses to arrive at a best-of-breed IAM solution that is structurally sound and integrates well in the organizational technology ecosystem. They implement IAM programs that enable efficiency and trim duplicative or overlapping technologies so that organizations are not over-licensed for capabilities that will not be utilized..."
Read More ...