Ensure success with identity and access management
Your initial IDAM solution specs should include detailed current and probable future functionality requirements, says Wayne Olsen, security business unit manager at Datacentrix.
A company's identities dictate who accesses its applications and data, as well as what can be done with that access, says Darran Rolls, CTO at SailPoint.
The need for identity and access management to secure data is a vital aspect of any comprehensive organisational security plan, says Jaroslav Cerny, CEO of RDB Consulting.
Identity and access management projects are a priority for many organisations, but where do they begin? Grenville Payne, consultant at Unisys Africa, has the answer.