Protecting porous perimeters via identity access management
With the growth of “mobile working” and an increasing number of business applications migrating to the cloud, the corporate perimeter has become more porous and vulnerable, driving demand for solutions that manage access and user identities securely and efficiently. This is where identity access management (IAM) technologies come into play. ING’s Sicco Boomsma explores.