By Jon Collins
At a recent panel event involving senior security managers and chief information security officers from a number of industries, Identity and Access Management was cited as one of the top priorities. Participants gave a number of reasons, which can be distilled into three categories: more efficient and less fragmented delivery of IT services; facilitation of better collaboration with customers and partners; and the necessity to demonstrate compliance with data protection legislation.
All of which would be great – if only identity and access management hadn’t proved impossible to implement. As one participant stressed, “We’re five years down the line, and it still hasn’t delivered.” Worthy of note: that’s not meaning, “delivered on its promises” mind, that’s, “delivered at all.” So, what is it that makes identity and access management so hard to do……….?
Through our research and insights, we help bridge the gap between technology buyers and sellers.
Have You Read This?
Generative AI Checkpoint
From Barcode Scanning to Smart Data Capture
Beyond the Barcode: Smart Data Capture
The Evolving Role of Converged Infrastructure in Modern IT
Evaluating the Potential of Hyper-Converged Storage
Kubernetes as an enterprise multi-cloud enabler
A CX perspective on the Contact Centre
Automation of SAP Master Data Management