Access Control is the core of the identity and access management task. Once we have correctly provisioned user data into the enterprise’s identity service we need to leverage it for access control. The vast majority of organizations use role-based access control, but increasingly, access control based on attributes is gaining traction.
Continue Reading →
It's critical that CIOs and C-levels pay attention to identity and access management in their organizations. Doing so will boost business security and save the business money, too.
Continue Reading →