Security Advisor Me Hosted A Roundtable In Partnership With Gulf It Network Distribution And Sailpoint, Which Focused On How Organisations Can Achieve Security And Business Agility With Identity And Access Management.
With the increasing number of cyber threats, unauthorised access and mounting regulatory pressures, many security leaders are turning their focus on securing end-users, which are often regarded as “weak links” within organisations.
In addition, the growing number of applications, platforms and devices have made the need to provide a safe and secure place to store critical information more and more prevalent. A demand that can be met properly implementing an effective identity and access management (IAM) programme.
Sailpoint regional director Tariq Jan kicked off the discussions by shedding light on how the IAM market has evolved over the years. “What we’ve seen in the region over the past 12-24 months is that a lot of organisations today are optimising identity to enhance other security solutions such as privileged access management, data loss prevention tools and GRC among others. This makes IAM a critical aspect of cybersecurity now more than ever.”
According to Jan, identity and access management revolve around three key pillars: single sign-on and multifactor authentication (MFA), identity governance and privileged access management (PAM).
“The first pillar, single sign-on and MFA, focuses on ensuring that the person accessing the system is who they say they are. Oftentimes, this is done through fingerprint authentication, access cards or password access,” Jan explained.
You can read up to 3 premium stories before you subscribe to Magzter GOLD
Log in, if you are already a subscriber
Get unlimited access to thousands of curated premium stories, newspapers and 5,000+ magazines
READ THE ENTIRE ISSUE