By Jason Macy | Date posted: May 18, 2017
Identity and Access Management (IAM) is well-entrenched in enterprise and government infrastructures.
However, in our API-driven world, merely establishing a “trusted user” – e.g., a device or a person – and granting them access to information provides an incomplete security profile. Lacking the ability to inspect the bidirectional flow of data traversing our modern computing architectures, IAM technologies cannot answer the two most critical questions about trusted users:
What information are they bringing into the network?
What information are they removing from the network?