With users connected to mobile networks, and with applications hosted in the cloud, traditional enterprise perimeter models are ineffective.
A new approach to the perimeter is required, one where the user themselves is the new perimeter and security can be built around the user, no matter what device they use or application they access.
In addition to the digital identities of employees, in increasingly integrated environments, IAM also needs to include suppliers and customers.
Level 5, 990 Whitehorse Road
Box Hill, VIC 3128, Australia
Phone: +61 3 9880 5555
Fax: +61 3 9880 5556