Executive Interview with Ravi Srinivasan, Director, Strategy and Product Management, IBM Security Systems who will be presenting in the keynote at Ovum Identity & Access Management Forum on 22 October.
Yes. With the rapid adoption of mobile, social and cloud-based services to expand the businesses and to collaborate with partners and consumers alike, the traditional use of IAM technology is changing to securely enable these transformations. Traditionally, IAM technologies are deployed as operational management tools to help IT demonstrate compliance and support the internal risk programs. Now, IAM technologies are viewed as key security controls, to help businesses improve assurance and strengthen the context in which access controls are determined and enforced across the enterprise.
How are IAM technologies evolving to safeguard the cloud, mobile and social interactions?
IAM technologies are becoming threat-aware. Cyber attackers target the weakest link within an enterprise – its people. As organisations rollout new mobile apps or increase use of cloud-based services, they need to implement context and risk-based access to minimize the use of passwords to control access to business resources. Organisations are also increasingly under pressure to not only authorise user access, but also inspect and block malicious content for affecting the business critical web applications and services.
Insider threat is on the spotlight. What can organisations do to address the threats from insiders?
This is a challenging security issue for organisations around the world. Insiders are more than just administrators and root users with shared access. They can be employees with high risk access. To tackle the insider threat, organisations are investing in privileged identity management that can manage and govern shared access and privileged user passwords, while auditing and recording the high risk session activities to address the growing insider breach and threats.