Identity eats security: How identity management is driving security

Protecting data and assets starts with the ability to identify with an acceptable level of certainty the people and devices requesting access to systems. Traditionally, identity has been established using a “secret handshake” (user ID and password) that gets the person or device through a gateway with access to permitted systems. Once through, few safeguards are in place to further confirm identity.

Read more: Identity eats security: How identity management is driving security

Story added 12. July 2018, content source with full text you can find at link above.