Archive for: February 2017

The Intersection of Identity Management and Physical Security

IAM
Most people think of identity management as a tool for enhancing the security of systems, applications, networks, and data. By effectively managing user credentials, organizations can maintain strict control over access to IT resources and gain greater visibility into user behavior that could present a security threat. However, identity management can also play a role in strengthening physical security,...

Why Identity Governance Must Be a Top Priority as EU Privacy Deadline Looms

Latest News
Any organization that controls or processes data on consumers in the European Union (EU) will soon be required to comply with the General Data Protection Regulation (GDPR). The new law, which goes into effect May 25, 2018, is expected to have a sweeping impact on the data protection and privacy practices of companies worldwide. Those organizations that aren’t fully...

Using KPIs to Redefine IAM Success, Part 2

IAM
In part 1 of our series on Using KPIs to Redefine IAM Success, we began talking about why identity management projects fail — or at least why they are perceived to have failed. In most instances, organizations adopt identity management solutions to reduce the risk of unauthorized access to systems and data. However, criteria such as operational complexity and...