The Big Story
Who are You…and What Do You Want? The Changing Nature of Identity & Access Management
How do you define identity? Ask any cybersecurity professional and you’re likely to get varying answers. In fact, the National Institute of Standards & Technology (NIST) says that “a single definition is widely debated internationally.”
But why is identity so important—and why is it so important to get it right?
Identity sits at the center of the cybersecurity universe. Users need to be validated to ensure they are who they say they are and they’re coming from a place of trust. Once validated, identity’s equally important partner, access, grants rights to the needed resources.
Historically, access was controlled by the physical walls of your office and, within that, the firewalls in your systems. That was your perimeter.
Today, with everything “out in the wild,” the focus is on ensuring secure, 24/7 access to people and applications and data and devices and things—oh my!—regardless of location or access point.
Listen to this podcast as Ron Temske, Logicalis VP of cybersecurity, network, and workplace solutions, and Microsoft Senior Program Manager Joey Snow discuss the new advancements and technologies being used for digital identity and digital identity management.