CIOReview
| | November 20176CIOReviewAs organizations and individuals extensively use smart devices and cloud computing to buy and deliver services, electronic identities have become a way for firms to know their customers and secure sensitive data. Identity governance is a critical process that clearly defines the business objectives for the control of access to IT systems and data.One the main objectives of identity governance is to mitigate risks, but this is becoming challenging by the day in the current interconnected era since cybercriminals have access to a range of advanced technologies capable of penetrating organizational networks. Cybercriminals are now exploiting human and technical weaknesses to infiltrate organizational networks and to use seemingly legitimate protocols and access rights to exfiltrate data. In order to detect such activities, firms require a detailed understanding of individuals' access rights and normal patterns of access that should be combined with the traditional network activity monitoring data. By taking into account user activity and proactively seeking out threats among innumerable legitimate activities, identity governance forms the foundation for security intelligence. To help achieve this, technology vendors are upping the ante and coming up with sophisticated data monitoring and analysis tools that can handle huge volumes of data and bridge the gap between compliance, business, and IT infrastructure operations.The main attraction here is cloud-based identity governance and administration tools that have improved data analytics capabilities. It is predicted that by 2019, more than half of identity governance and administration vendors will be providing governance capabilities as a service, up from less than 10 percent in 2016.At this juncture, where technology providers are ardently advancing the features of identity governance solutions, CIOReview's presents its Identity Governance and Administration special edition featuring innovative solution providers and insights from industry thought leaders.We hope this edition is valuable in helping you devise an effective identity governance and administration strategy.Copyright © 2017 ValleyMedia, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.CIOReviewNOVEMBER - 14 - 2017Mailing AddressCIOReview44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.402.1463, F:510-894-8405 November - 14 - 2017 Vol 06 SE 127 Published by ValleyMedia, Inc.To subscribe to CIOReviewVisit www.cioreview.com IDENTITY GOVERNANCE & ADMINISTRATION SPECIALCIOReviewEditorial StaffSalesT: 510-565-7614Aaron PierceJoshua ParkerVictor Cook Eileen SinghJustin SmithVishnu V SanthoshAndrew Smithandrew@cioreview.comVisualizerSudhin ThomasManaging EditorJeevan GeorgeEditorialIdentity and the Changing Threat LandscapeJeevan George Managing Editoreditor@cioreview.com*Some of the Insights are based on the interviews with respective CIOs and CXOs to our editorial staff
< Page 5 | Page 7 >