On the spot

On the Spot: Identity and Access Management

On a scale of one to ten, with ten being the highest priority, how important is IAM in end-user organisations and how high up is it on current IT spending priority lists? Brainstorm finds out.

02 October 2009

Security has top of mind awareness these days, what with cyber crime hitting the headlines, crooks getting smarter, and more serious, and insider threats increasing as wallets feel the pressure. Identity and access management is a critical part of any holistic security approach. This month Brainstorm decided to find out just how critical it is.

❒  IAM must rank as a ten in terms of priority but the reality is that it is closer to a one on current IT spending priority lists. The disparity occurs because, like most security-based initiatives, companies are unaware of, or often don’t want to know about, the size of the problem. We are amazed by the number of CIOs and other executives who acknowledge their vulnerability, but in the same breath comfort themselves by stating that they are at low risk. All a company needs is one major security infringement and it will wake up to the value that IAM offers.

ITWeb Premium

Get 3 months of unlimited access
No credit card. No obligation.

Already a subscriber Log in