The Need for Enterprises to Evolve Identity and Access Management Strategy

Identity and Access Management (IAM) remains a key security, risk management and business discipline. IAM ensures that the right people get access to the right resources at the right times for the right reasons, enabling desired business outcomes.

Traditional enterprise operational and business needs — anchored by effective risk management and regulatory compliance practices — continue to drive IAM programs. In 2014, however, Gartner finds the most significant impacts on IAM stem from the Nexus of Forces in social, mobile, cloud and information.

According to Gartner, Identity and Access Management Programs must now embrace:

  • A greater number of users across a greater variety of constituencies who increasingly demand better user experiences.
  • A greater variety of endpoints. The Internet of Things (IoT) means that many different devices will provide access to corporate assets — or have it in their own right.
  • A greater variety of applications across corporate data centers, as well as private and public clouds.
  • More heterogeneous organizations, in which individual business units often adopt new technologies without central IT support or oversight (also known as “shadow IT”).

Identity and Access Management

Gartner, January 2014 (ID:G00259368) – Agenda Overview for Identity and Access Management, 2014