top of page

Marrying Monitoring with IAM (Identity and Access Management)

IAM (Identity and Access Management) often gets overlooked when laying out a security strategy for an organization.  It is often assumed that LDAP controls and password policies will meet the needs of access management.  But as organizations grow, so do their user bases, both in complexity and diversity.  Often identities begin to fall into multiple silos including employee, customer and vendor.  Managing and monitoring identities across all of these silos is quickly becoming a fundamental need as organizations work to stem the tide of criminal threats against PII.

1 view

Recent Posts

See All

Comments


bottom of page