Identity
Cloud services pose new security and access challenges. Traditionally, users do the following:
- Only access the organization's resources inside the organization's network perimeter
- Only access the organization's services that are hosted on the organization's hardware
With cloud services, enterprise mobility, bring-your-own-device (BYOD) objectives, and the consumerization of information technology (IT), organizations are unable to think of security and access in the traditional way. Users are accessing a variety of services from a multitude of vendors from both company-owned and personal devices. Identity is the new security perimeter for companies since it is the ultimate key to access.
From a cloud service perspective, identity defines who users are, what permissions they have, and what they can do with these permissions. With that, organizations need to plan how to protect users wherever they are.
As we have discussed throughout...