Identity and access management (IAM) is as old as the Internet, but mobility initiatives and cloud applications are putting stress on companies’ security perimeters, especially when it comes to IAM policies and approaches. Challenges to IAM still exist—though one may have thought they’d been addressed years ago. Today, companies are reacting with IAM organizational, technology, and process initiatives to help win back a certain measure of control, and ideally enhance the company’s security posture.
Already an ESG client? Log in to read the full report.
Not a client? Contact us to learn more.