Knock knock, who’s there? Closing the door on hackers with identity

Imagine granting someone access to your front door, without giving them any rules for visiting – like whether they must pay for breakages, bring their own milk for the fridge, or that it’s lights out at 11pm. It’s not something most of us would be comfortable with.

When it comes to our enterprise’s network, however, there seems to be a different story.  All too often, organisations are forgetting about the ‘identity’ in identity and access management (or ‘IAM’), granting entry to users without considering whether they should have access.

MORE ABOUT: ,