ICIT Analysis: Identity and Access Management Solutions: Automating Cybersecurity While Embedding Pervasive and Ubiquitous Cyber-Hygiene-by-Design

iam

Download Here

Identity and Access Management (IAM) solutions are a critical component of organizational cyber-hygiene and cybersecurity initiatives because IAM solutions automate cyber-hygiene best practices, reduce user fatigue, provide access controls, establish user accountability, institute system auditability, and enable users to mitigate cyberattacks.

In this analysis, entitled “Identity and Access Management Solutions: Automating Cybersecurity While Embedding Pervasive and Ubiquitous Cyber-Hygiene-by-Design“, ICIT discusses the important role that IAM plays as part of a robust cyber-hygiene program and provides details on how IAM solutions address some of the most high-impact actions of un-cyber-hygienic personnel.

ICIT invites readers to attend the ICIT Winter Summit (January 23, 2017; Ritz-Carlton Pentagon City) where the Nation’s top cyber-hygiene and identity management experts will further explore the concepts discussed in this paper.

This paper was authored by James Scott (Sr. Fellow, ICIT) and Drew Spaniel (Researcher, ICIT).

 

This study was underwritten by:

Centrify

 

 

 

 

 


 

526x147_Cyber-Intelligence-Briefing

 

Leave a Reply