Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

These changes in IT have made one

thing clear: In the future, it will be


easier to track users than devices.
The old IAM concept of tracking users
by tracking the devices they use
will no longer be an option, and the
way IT departments practice IAM
will likely change radically in years
to come. Tomorrow s users will have
to be provisioned, monitored, and secured across a wide variety of locations, de
vices, networks, and applications that could change many times a day.
IAM, it seems, is undergoing a revolution. Enterprises that need to secure those
user identities and access privileges are faced with a new set of challenges: p
rotecting critical corporate data when they can t be sure where users will be, wha
t devices or networks they will be using, or what applications will be importing
the data. Tomorrow s IT environments will require enterprises to rethink their id
entity management approaches in order to keep their most important systems and d
ata safe from theft and tampering.

You might also like