Identity and Access Management

Data Logging and Audit: The IAM advantage

One of the key functions of an effective Identity and Access Management (IAM) solution is data logging, to capture and…

2 years ago

Flexible Identity: IAM solutions need to bend… a little at least!

In the world of Identity and Access Management (IAM), flexibility is the key to stability. While IAMs are not new,…

2 years ago

Authentication, Authorization, Auditing: the Three Pillars of IAM

In an earlier article, we explored the 3 pillars of a Cloud Access Security Broker (CASB), with Identity and Access…

2 years ago

IAM as the Solution to Healthcare Sector Challenges

Healthcare organizations are unique in the volume and sensitivity of information that they hold. Reports say that healthcare is among…

3 years ago