Intelligent CIO Europe Issue 66 | Page 43

FEATURE : CLOUD SECURITY standard features of employee name , device and access privileges with behavioural and geographic data . For example , an employee in London who rarely travels and never works on the weekend should be challenged if they try to access a database from Australia on a Saturday . While the user can work frictionlessly on a day-to-day basis , the organisation still benefits from the layered security offered by IAM .
Ultimately , an effective , long-term IAM strategy uses risk assessment and contextual intelligence to guide IT admins on when to challenge users without standing in the way of a flexible or smooth working experience .
Identity transformation as the foundation of security strategies
Today , many modern-day businesses implement identity management into their security strategies . Driven by the growing complexity of the cloud and hybrid environments and an increasingly proactive approach to security , it is becoming clear to businesses that identity transformation is the future of
Denis Dorval , Vice President , International ( EMEA & APAC ) at JumpCloud
www . intelligentcio . com INTELLIGENTCIO EUROPE 43