Identity and access management technology has been around for decades, but identity-related breaches happen every day. The problem is not the underlying system. It’s whether organizations can take advantage of the wealth of data within their systems, said Radiant Logic's Wade Ellery, Field Chief Technical Officer and Senior Evangelist at Radiant Logic.
In this interview with Information Security Media Group, Ellery discusses:
- The challenges of legacy IAM systems and the path forward with better data;
- The role of zero trust and policy-based access in stopping cybercriminals;
- A look into the future of identity and access management.