Page Properties | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Abstract
While most organizations view security as ‘keeping the bad guys out’, Identity and Access Management (IAM) approaches security from the opposite direction – focusing on how to securely let business in and control application access to internal employees, external customers and business partners.
(Young, 2004, p. 1)