Access your Pro+ Content below.
Is third-party vendor management the next IAM frontier?
Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors. In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Today's IAM programs manage a far wider range of user types and access points. Bring your own device, cloud computing, and the rapid spread of distributed applications and data have all added to the security challenges.
In this issue, we also look at enterprise mobility strategies. As more companies embrace a mobile-first strategy, security programs increasingly provide some level of support for personally owned devices and apps. But enterprise mobility is a double-edged sword: Providing broad data access and communication capabilities for much of the workforce can introduce challenging security issues. More CIOs and CISOs are recognizing that coherent policies are the key to harnessing the benefits of bring your own device.
Finally, cybersecurity skills shortages are widespread. The skills to combat advanced threats have outpaced those needed for conventional IT security. We look at strategies that may ease the pain as enterprises compete for a highly sought-after global workforce.
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Identity and access management of employees is so complex that many companies have faltered when it comes to securing programs for trusted partners.
Today, many companies have adopted a mobile-first strategy. But when employees are left to their own devices, InfoSec pros face uncharted territory.
The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles.
This Beyond the Page informs InfoSec pros of the security concerns related to third-party vendor access, and how an enterprise IAM strategy can help.
Columns in this issue
The problem-solving skills that many enterprises need to counter threats are hard to identity, let alone multiply.
The financial success of the security industry has created "breach" ambulance-chasers. Can grassroots efforts still move InfoSec forward?
Security pros are too stretched to digest actionable intelligence on a continuous basis. Dedicated appliances may help ease their load.