"Many organisations start their identity journey with a combination of only short-term objectives, poor identity data, immature identity architecture and weak user verification," warns Scott Swalling, a cloud and data security expert at PA Consulting.
"A poor IAM approach, at best, can make it cumbersome and frustrating for your users and administrative staff. Onerous processes that don't take full advantage of IAM capabilities will breed users finding ways around them - as they always have - leading to security issues and potentially breaches."
"If you don't identify your users, it's hard to have any type of security. If you don't know who is accessing your systems, how do you know if they should be accessing them, or not?" warns Akif Khan, a vice-president analyst at Gartner who focuses on IAM.
"We need to transition to an identity-first security culture," warns Akif Khan, emphasizing that IAM is replacing the old idea of organisations having a secure perimeter.
Collection
[
|
...
]