Access Governance Strategy and Technology: How to Plan It Well

Over the past couple of years, increasingly more sysadmins have abandoned the more “traditional”, hands-on, approach to access and identity management in favor of IAG or Identity and Access Governance. The switch from hands-on to IAG is more than taking advantage of emerging technologies; one would call it an authentic epistemological shift; an out-with-the-old-in-with-the-new methodology. […]

The post Access Governance Strategy and Technology: How to Plan It Well appeared first on Heimdal Security Blog.