Identity and access management (IAM) professionals need to protect information and prevent unauthorized users from accessing business-critical systems in an increasingly complex IT environment. They must not only control employee access but also enable the extended enterprise to share data and intellectual property securely despite an ever-increasing variety of user-owned consumer devices. Identity intelligence connects fraud management, data protection, and IAM processes using pattern recognition, allowing S&R professionals to not only stay ahead of fraudsters but also generate tangible business benefits by turning actionable identity intelligence into business intelligence.