Use RSA Via Access to establish your identity perimeter
In my blog about the loss of the corporate perimeter seen here, I discuss identity as the new perimeter. It's important to recognize that enterprises are at varying placing in their journey to embrace the identity perimeter. Without throwing away all your current investments, RSA Via Access can help you manage this new perimeter wherever your company is in the journey.
I'd love to hear thoughts from others on what they see in companies embracing (or not) the identity perimeter.
- Cloud Auth
- Cloud Authentication
- Cloud Authentication Service
- Community Thread
- Forum Thread
- RSA SecurID
- RSA SecurID Access
- SecurID Access
What I hear from organizations and analysts is that the types of identities are also growing and changing. It used to be that IT was responsible for managing the access of employees only. But now, in order to remain competitive and stay agile, that has changed; IT is now being charged with responsibility for customer identities, partner identities, other 3rd party identities, etc. And these identity pools come with their own unique challenges.
Organizations should take a holistic approach to managing these different identity types, and that starts with centralization of processes and visibility into all identity sets.
It's interesting. One of the most challenging aspects of this isn't technical at all. It is to determine and get consensus on what are the policies you do want to enforce for these groups.