PRO+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
August 2016

What's New in IAM Security and Strategy

Sponsored by SearchSecurity.com

Most of the pivotal changes in identity and access management, or IAM, were discussed and developed at least ten years ago. Deployment of advanced IAM security technology has been glacial in comparison to most other security technologies because of its unavoidable complexity and its inherent intertwining with virtually every aspect of corporate IT. What's changed in recent years is that some of the use cases that push toward IAM concepts like federation and cloud-based identity stores have picked up considerable steam.

In this three-part technical guide, we consider how enterprise IAM strategy needs to adapt so that companies can cope securely with paradigm-changing technology like cloud services, software-defined everything and the internet of things. Readers of this guide to IAM security today will learn how IAM strategy and architecture have evolved and how corporations must adapt their systems if they are to employ identity and access management effectively and safely through the next decade.

Table Of Contents

  • Update and integrate your IAM strategy and technology
  • IAM collides with the internet of things
  • IAM addresses unstructured content security risks