In 2012 Randall Gamby wrote an interesting article on the relationship between identity management and compliance. He stated that identity and access management (IAM) systems could be broken down into two activity areas: predetermined and real-time access control. He went …
Read MoreThe goals of any Identity and Access Management (IAM) program are to support an organization’s mission and activities by ensuring that access to data in the organization is granted to the right person at the right time and removed when …
Overview
Identity and access management (IAM) is one of the few IT activities where an organization’s security posture and employee productivity are both in play. The same problems that exist for security, IT operations, and other aspects of IT are …
Read More