Is Your Identity Management Comprehensive Enough? Are You Just Tipping Your Toes?
The critical components of an identity strategy, experts say, are to capture the data domains, engage using MFA, manage by providing user attributions, and administer managing identities from unauthorized sources. But are they adequate? Are you taking a piecemeal approach that does not help in compliance? Any written IM policy that can’t be enforced becomes ineffective.
See Also: Webinar | Prisma Access Browser: Boosting Security for Browser-Based Work
The session will cover:
- Components of a comprehensive identity management program
- How to balance between authentication and user experience
- How to manage the identity of your vendor partners