Why Read This
This report helps you understand and navigate the major business and technology management trends affecting IAM in the next five years. Increasingly in 2015, IAM has become a tool not just for security but also business agility. As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, vital business processes will invariably traverse different user populations, hosting models, and devices. These trends create pressing provisioning, authentication, and authorization challenges for S&R pros while compliance requirements, breaches, and other security threats continue to swell. This report recommends that S&R pros apply a Zero Trust information security model to IAM to unify and improve access control across the digital business. This is an update to the report of the same name originally issued to clients on April 7, 2014; it includes updated charts and new 2014 Business Technographics data and adds a discussion on Zero Trust authentication.