Threat Centric Identity and Access Management
By Rakesh Radhakrishnan and Mark Coderre
Conventional security architecture took advantage of ingress and egress points on a fairly well defined set of enterprise perimeters. Various cloud patterns (IaaS, PaaS, and SaaS) have disrupted the perimeter and in some cases (such as native mobile to SaaS) totally bypassed it. This whitepaper presents a new concept for Threat Centric IAM to address the need to enhance security measures with a threat intelligence approach.
This Whitepaper discusses:
- A Definition of Threat Centric Identity and Access Management (IAM).
- A Capability Model for Threat Centric IAM – understand enterprise IAM maturity via a capability model with four levels.
- Enterprise Benefits from Threat Centric IAM – understand how threat centric IAM approach allows for business enterprises to expand to cloud computing and the economies of scale it has to offer.
- Real World Vendor Examples of Threat Centric IAM – examples of Threat Centric IAM integration already taking shape in the Industry today.
Please fill out the form on the right to download the whitepaper.