Rsa

For the full podcast, see the bottom of the page.

In today’s day and age, applications are as mobile and ever changing as people themselves. To grasp how to optimise their security is crucial, as 2016 saw 81% of hacking-related breaches happen either through stolen or weak passwords. Identity access management is quickly becoming the key to a safe and successful business, free from the concerns of attacks and breaches at such a high rate in a time of immense vulnerability.

We caught up with Alaa Abdulnabi, Head of Identity Business for EMEA at RSA, about the state of identity access management, how RSA has been tackling the subject and Alaa’s own encounters with it. What we learned was invaluable.

Identity access management is the closest it has ever been to the user, focusing on digital identities and entitlements given to individuals, in order to let them carry on their work. It is crucial the user knows that there is transparency with the expectations on their end, as identity access management should be simple, up front and direct for people looking to manage and access information. This guarantees a boost in productivity and experience.

Another great quality we got to hear about from Alaa’s side was the focus on cost-effectiveness. Many companies have a preconceived notion that there will be a costly aspect to implementing identity access management, but most of the time this results in spending too much money spent over strategies and methods that turn out to be ineffective. Identity access management should strive to meet practicality and expenditure in equal or fair measures, assuring that all one pays for will pay off.

Over 63% of confirmed breaches happen from compromised credentials; this is due to the worldwide demand of digital transformation. Nowadays companies are forced to either start digital or adapt if they are older, meaning it is crucial they implement security from the start, as identity theft and breaches are more common than ever.

Months after GDPR, it has become imperative for data controls and processors to implement organisation and technical safeguards that will protect EU citizens. This means identifying and blocking data breaches and automatically recognising and securing personal data. An effective identity access management strategy enables companies to be compliant without the usual concerns of inconvenience.

To see how this works and its benefits, as well as real-life examples of companies thriving with identity access management, this podcast will help elucidate the cloudy doubts revolving around how one keeps their identity safe and secure within a company.

Liked this interview? Listen to first female White House CIO Theresa Payton!

LEAVE A REPLY

Please enter your comment!
Please enter your name here