This resource is no longer available
As organizations continue to adopt cloud technologies and enable remote workforces, approaches to security have evolved to reflect modern threats.
The perimeter has vanished, and the idea of a physical network is being replaced with the practice of focusing security on end user devices and access management.
This handbook provides a glossary of explanations for important access management terms, defining key concepts such as:
- Identity Governance & Administration (IGA)
- Authentication & authorization
- Single Sign-On (SSO)
- And more
Read on to get your copy of the access management handbook.