Subscribe

eBook: Five myths about identity governance


Johannesburg, 21 Apr 2020

As years have gone by, technology has advanced and the threats enterprises face have changed. There’s also been a paradigm shift in how organisations protect themselves. 

In the past, having firewalls and protecting physical perimeters used to be enough. Now, the attack vector of choice for hackers, and the most prevalent point of access in an organisation, are its people. And so new methods of protection arose, such as provisioning and access management.

Over the past decade, the identity governance space has evolved and matured, changing with the world around it. But some myths have persisted, and these misconceptions have, in some cases, been misleading organisations on how they should be protecting themselves. 

This eBook examines these myths.

Share