> White Papers > IBM > Identity and Access Intelligence: Transforming the Nature of Enterprise Security

Identity and Access Intelligence: Transforming the Nature of Enterprise Security


Today's technology landscape is transforming the concepts of business IT prevalent only just a few short years ago. With this transformation, however, has also come an equivalent transformation of risks. Threats have exploded, from mass malware and "industrialized" attacks, to the long-term actions of the more adept adversary. Within the organization, sensitive assets can be exposed to variety of risks, from errors and oversights made by well-meaning individuals, to those who exploit trust for personal gain or malicious intent.

These factors have led to an increased focus on identity governance to assure consistency in defining roles and delegating access privileges -- yet there is a higher business demand still. Intelligence is needed into how IT's transformations impact the nature of how roles are defined and access is provisioned, managed and enforced. When coupled with defense, identity and access intelligence couples a richer concept of identity with context-based access control and greater visibility into the nature of interactions with IT and the precious assets under its management, across all security domains.

In this paper, EMA describes the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. In examples that highlight the ways in which this trend is taking shape, EMA illustrates how identity and access intelligence is becoming a central focus of security essential to defending sensitive assets and assuring that the IT investment enables the business and those it serves.

Tags : enterprise security, ema, ibm, security, intelligence, enterprise applications

* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Jul 12, 2012
Length:  13
Type:  White Paper