Market Trends: Saying Goodbye to One-Size-Fits-All IAM Solutions

Market Trends: Saying Goodbye to One-Size-Fits-All IAM Solutions

Interest in IAM solutions has increased substantially over the past few years, as the perpetrators of many high profile breaches have exploited stolen credentials to steal sensitive data and inflict damage on their victim organizations. And, as the popularity of IAM solutions has increased, the solutions are evolving. Once one-size-fits-all IAM products forced their customers’ processes to bend to the product’s requirements. Now, flexibility is replacing rigidity as the governing concept, as IAM solutions – now more accurately described as IAG – are molded to accommodate the established business processes of the user. As the ecosystem IAM products must account for – mobile devices, cloud services, federated users, etc. – expands in complexity, single-product approaches will be challenged. Solutions deployed into existing environments designed to automate existing processes, not modify them, are likely to gain popularity. These “IAM-lite” solutions that allow controls to be extended from the enterprise to hosted services and applications are likely to flourish in this rapidly evolving marketplace.

Don’t miss a post! Subscribe to The Insider Threat Security Blog here:

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Start a Free StealthAUDIT® Trial!

No risk. No obligation.