easier to track users than devices. The old IAM concept of tracking users by tracking the devices they use will no longer be an option, and the way IT departments practice IAM will likely change radically in years to come. Tomorrow s users will have to be provisioned, monitored, and secured across a wide variety of locations, de vices, networks, and applications that could change many times a day. IAM, it seems, is undergoing a revolution. Enterprises that need to secure those user identities and access privileges are faced with a new set of challenges: p rotecting critical corporate data when they can t be sure where users will be, wha t devices or networks they will be using, or what applications will be importing the data. Tomorrow s IT environments will require enterprises to rethink their id entity management approaches in order to keep their most important systems and d ata safe from theft and tampering.