top of page

Marrying Monitoring with IAM (Identity and Access Management)

IAM (Identity and Access Management) often gets overlooked when laying out a security strategy for an organization.  It is often assumed that LDAP controls and password policies will meet the needs of access management.  But as organizations grow, so do their user bases, both in complexity and diversity.  Often identities begin to fall into multiple silos including employee, customer and vendor.  Managing and monitoring identities across all of these silos is quickly becoming a fundamental need as organizations work to stem the tide of criminal threats against PII.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page