Enterprise Identity Management and the Data Conundrum

As a security professional specialising in Identity Management, I have often been floored by the hierarchical and arcane construct within which Enterprise access entitlement data is used. Before we dig deeper into this, however, a couple of terms need explaining. First off, Identity data can be used to derive information about the individual whereas entitlement […]

Enterprise Identity Management and the Data Conundrum Read More »