Technology Magazine December 2020 | Page 153

security principles ” Carstens adds . “ Identity and access management is not just about the technology , it also involves the organisation ’ s people , processes and governance on the service . This holistic approach will provide secured flexibility for your remote workforce to remain productive and ‘ work from anywhere ’.”
Defending against those threats requires capabilities across a range of arenas . “ Digital identity can roughly be carved up into four different areas ,” says Van Bennekom . “ One is the work force identity space , so access management , but also identity governance . Second , is privileged access management , for users such as database administrators that , basically with one press of a button , can wipe out a complete IT estate . Thirdly , we have customer identity , from B2B customers to consumer scenarios , or even governments and how they interface with their citizens . Lastly , we have artificial intelligence , RPA and the identity of things .”
With such a wide range of areas to be aware of , a holistic approach is necessary . “ What ’ s most important
153 technologymagazine . com