IAM trouble ahead as legacy tech meets next-gen apps
IAM deployments are notoriously complex - and things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors.
In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Also inside:
- BYOD, cloud computing, and the rapid spread of distributed apps and dataare adding to security challenges
- A look at enterprise mobility strategies
- The widespread shortage of cybersecurity skills
- And more