In today’s increasing open and interconnected enterprise, traditional perimeters are quickly being extended to multi-perimeters to support secure adoption of mobile, cloud, social and information interactions. The traditional network, IT, and end-point security capabilities are being enhanced to support these interactions and similar demands are put on the Identity and Access Management systems too.
In this session, IBM will share the changing security landscape from rapid adoption of mobile, cloud, social and information transformation and the resulting needs to extend traditional Identity and Access Management for the future. This session will also cover an Identity and Access Management maturity model to help organizations and agencies evaluate and address the emerging security and market needs.