Identity and Access Management (IAM) is a primary security control in protecting against the potential threat of cyber attacks
To successfully protect their organizations against cyber attacks, modern security teams must minimize operational risk through security-related policies, regulatory compliance, data privacy protocols, company security response processes and optimal security architecture. The key to the latter, according the 2018 TAG Cyber Security Annual analyst report, is to create an architecture based on specific controls that support the reduction of cyber risk.
IAM is one of the mandatory foundational controls for organizations. The report notes that IAM has emerged as a primary cyber security control in de-perimeterized enterprise security protection, and that managing and enforcing policies around who can access what resources and under what conditions requires a complex set of functions and associated processes.
This is where Ping Identity helps its customers. As one of the distinguished vendors in the report, Ping “provides single sign-on and identity management solutions with emphasis on mobile access to the cloud,” which the report predicts is at the heart of future IAM trends. The report also carries an interview with Andre Durand, CEO of Ping, on how IAM is both “a defensive protector of attacks and an aggressive enabler of new services.”
To download key excerpts from the 2018 TAG Cyber Security Annual practical handbook and reference guide for CISO team members, fill out the form on the right.