PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
August 2015

Is third-party vendor management the next IAM frontier?

Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors. In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Today's IAM programs manage a far wider range of user types and access points. Bring your own device, cloud computing, and the rapid spread of distributed applications and data have all added to the security challenges.

In this issue, we also look at enterprise mobility strategies. As more companies embrace a mobile-first strategy, security programs increasingly provide some level of support for personally owned devices and apps. But enterprise mobility is a double-edged sword: Providing broad data access and communication capabilities for much of the workforce can introduce challenging security issues. More CIOs and CISOs are recognizing that coherent policies are the key to harnessing the benefits of bring your own device.

Finally, cybersecurity skills shortages are widespread. The skills to combat advanced threats have outpaced those needed for conventional IT security. We look at strategies that may ease the pain as enterprises compete for a highly sought-after global workforce.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close